Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 09 Feb 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:simsong:bulk_extractor:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 29 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Simsong
Simsong bulk Extractor |
|
| Vendors & Products |
Simsong
Simsong bulk Extractor |
Wed, 28 Jan 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | `bulk_extractor` is a digital forensics exploitation tool. Starting in version 1.4, `bulk_extractor`’s embedded unrar code has a heap‑buffer‑overflow in the RAR PPM LZ decoding path. A crafted RAR inside a disk image causes an out‑of‑bounds write in `Unpack::CopyString`, leading to a crash under ASAN (and likely a crash or memory corruption in production builds). There's potential for using this for RCE. As of time of publication, no known patches are available. | |
| Title | bulk_extractor has Heap-based Buffer Overflow vulnerability | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-29T18:01:12.601Z
Reserved: 2026-01-27T14:51:03.061Z
Link: CVE-2026-24857
Updated: 2026-01-29T16:03:06.194Z
Status : Analyzed
Published: 2026-01-28T22:15:56.350
Modified: 2026-02-09T16:47:23.343
Link: CVE-2026-24857
No data.
OpenCVE Enrichment
Updated: 2026-04-18T01:45:33Z