7.8
CVSSv3

CVE-2019-14745

Published: 07/08/2019 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

In radare2 prior to 3.7.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to improper handling of symbol names embedded in executables.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

radare radare2

fedoraproject fedora 29

fedoraproject fedora 30

fedoraproject fedora 31

Vendor Advisories

Debian Bug report logs - #934204 radare2: CVE-2019-14745 Package: src:radare2; Maintainer for src:radare2 is Debian Security Tools <team+pkg-security@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 8 Aug 2019 07:33:02 UTC Severity: important Tags: security, upstream Found in ve ...

Github Repositories

weaponized radare2 vulnerability found by @CaptnBanana and blenk92

CVE-2019-14745 weaponized radare2 vulnerability (CVE-2019-14745 assigned) found by @CaptnBanana and blenk92 For details about vulnerability, read bananamafiadev/post/r2-pwndebian/ Usage First of all, you need Python bindings of LIEF (liefquarkslabcom/) Then, run script as: python nukeradare2py <binary_name> <one of the symbols of that bi