
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in retdec v3.3 affecting the canSplitFunctionOn() function in ir_modifications.cpp. The vulnerability, identified as CVE-2020-23907, was disclosed on April 21, 2021. The flaw involves a possible out-of-bounds read due to a heap buffer overflow in the binary analysis tool (NVD).
The vulnerability exists in the canSplitFunctionOn() function within ir_modifications.cpp. The issue occurs when the function attempts to decrement an iterator (up) without checking if it equals fncStarts.begin(), which can lead to an out-of-bounds read condition. This happens in two code portions where the iterator manipulation is performed without proper boundary checks (GitHub Issue).
The vulnerability can result in Denial of Service, Memory Disclosure, and Possible Code Execution. The CVSS v3.1 base score is 9.8 Critical, with attack vector being Network, attack complexity Low, and requiring no privileges or user interaction (AttackerKB).
A fix was implemented by adding proper boundary checks before decrementing the iterator. The patch involves checking if the iterator equals fncStarts.begin() and returning false in such cases, preventing the out-of-bounds read condition (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."