6.8
CVSSv2

CVE-2022-1240

Published: 06/04/2022 Updated: 14/04/2022
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 before 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](cwe.mitre.org/data/definitions/122.html).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

radare radare2

Vendor Advisories