
Cloud Vulnerability DB
A community-led vulnerabilities database
Radare2 version 5.7.0 was discovered to contain a heap buffer overflow vulnerability in the consumeencodedname_new function located in format/wasm/wasm.c. This vulnerability was assigned CVE-2022-34502 and was disclosed in July 2022 (NVD, MITRE).
The vulnerability exists in the WASM name handling functionality of Radare2. Specifically, the issue occurs in the consumeencodedname_new function within format/wasm/wasm.c, where a heap buffer overflow can be triggered when processing crafted binary files. The vulnerability was confirmed using AddressSanitizer, which detected a write operation beyond the allocated buffer boundaries (GitHub Issue).
This vulnerability allows attackers to cause a Denial of Service (DoS) by crafting specific binary files that trigger the heap buffer overflow. When exploited, the vulnerability can lead to program crashes and potential service disruption (NVD).
The vulnerability was patched in version 5.7.8. Users are recommended to upgrade to this version or later to address the security issue (OpenSUSE Build).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."