6.8
CVSSv2

CVE-2019-19590

Published: 05/12/2019 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

In radare2 up to and including 4.0, there is an integer overflow for the variable new_token_size in the function r_asm_massemble at libr/asm/asm.c. This integer overflow will result in a Use-After-Free for the buffer tokens, which can be filled with arbitrary malicious data after the free. This allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via crafted input.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

radare radare2

Vendor Advisories

Debian Bug report logs - #947791 radare2: CVE-2019-19590 Package: src:radare2; Maintainer for src:radare2 is Debian Security Tools <team+pkg-security@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 30 Dec 2019 20:09:04 UTC Severity: important Tags: security, upstream Found in ve ...