
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-32495 is a use-after-free vulnerability discovered in Radare2's pyc parser, specifically in the getnoneobject function. The vulnerability was identified in version 5.3.0 and was disclosed on May 7, 2021. This security flaw affects the Radare2 reverse engineering framework, a widely used tool for binary analysis (NVD, CVE).
The vulnerability is classified as CWE-416 (Use After Free) and has received a CVSS v3.1 base score of 9.1 CRITICAL (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H). The issue occurs in the pyc parser's getnoneobject function where the code attempts to read freed memory after it has been deallocated. This can lead to memory corruption and potential exploitation (NVD).
The vulnerability allows attackers to read freed memory and potentially cause denial of service conditions. Given the CVSS score and vector, the vulnerability can be exploited remotely without requiring privileges or user interaction, potentially leading to high impacts on confidentiality and availability of the affected system (NVD).
A patch was released to address this vulnerability through a commit in the Radare2 repository. The fix involves proper handling of memory management in the pyc parser's getnoneobject function (GitHub Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."