Heap buffer overflow in libr/bin/format/mach0/mach0.c in...
High severity
Unreviewed
Published
Apr 7, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Apr 6, 2022
Published to the GitHub Advisory Database
Apr 7, 2022
Last updated
Jan 27, 2023
Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the
r_str_ncpy
function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see CWE.References