NA

CVE-2022-34502

Published: 22/07/2022 Updated: 08/08/2023
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Radare2 v5.7.0 exists to contain a heap buffer overflow via the function consume_encoded_name_new at format/wasm/wasm.c. This vulnerability allows malicious users to cause a Denial of Service (DoS) via a crafted binary file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

radare radare2 5.7.0

Vendor Advisories

Debian Bug report logs - #1016979 radare2: CVE-2022-34502 CVE-2022-34520 Package: src:radare2; Maintainer for src:radare2 is Debian Security Tools <team+pkg-security@trackerdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Wed, 10 Aug 2022 20:15:09 UTC Severity: important Tags: security, upstream ...