Rizin is a UNIX-like reverse engineering framework and command-line toolset. In versions up to and including 0.3.1 there is a heap-based out of bounds write in parse_die() when reversing an AMD64 ELF binary with DWARF debug info. When a malicious AMD64 ELF binary is opened by a victim user, Rizin may crash or execute unintended actions. No workaround are known and users are advised to upgrade.
References
Link | Resource |
---|---|
https://github.com/rizinorg/rizin/commit/aa6917772d2f32e5a7daab25a46c72df0b5ea406 | Patch Third Party Advisory |
https://github.com/rizinorg/rizin/issues/2083 | Third Party Advisory |
https://github.com/rizinorg/rizin/security/advisories/GHSA-hqqp-vjcm-mw8r | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2021-12-13T19:35:12
Updated: 2021-12-13T19:35:12
Reserved: 2021-11-16T00:00:00
Link: CVE-2021-43814
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-12-13T20:15:07.640
Modified: 2021-12-22T21:29:35.347
Link: CVE-2021-43814
JSON object: View
Redhat Information
No data.
CWE