Description
Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-24575 | Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). |
References
History
No history.
Status: PUBLISHED
Assigner: @huntrdev
Published:
Updated: 2024-08-02T23:55:24.530Z
Reserved: 2022-04-05T00:00:00.000Z
Link: CVE-2022-1240
No data.
Status : Modified
Published: 2022-04-06T11:15:07.587
Modified: 2024-11-21T06:40:19.473
Link: CVE-2022-1240
No data.
OpenCVE Enrichment
No data.
EUVD