
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-36040 affects Rizin, a UNIX-like reverse engineering framework and command-line toolset. The vulnerability was discovered in versions 0.4.0 and prior, where an out-of-bounds write vulnerability exists when processing PYC (Python) files. The issue was disclosed on September 6, 2022, and was patched in version 0.4.1 (NVD, GitHub Advisory).
The vulnerability is an out-of-bounds write condition in the pyc/marshal.c file. The issue occurs specifically in the getcomplexobject function when processing PYC files. The bug was identified through fuzzing and can be triggered when parsing maliciously crafted PYC files. The vulnerability received a CVSS score of 7.0 (AV:L/AC:M/Au:N/C:C/I:C/A:C), indicating high severity (Rapid7).
If successfully exploited, this vulnerability could allow an attacker to execute arbitrary code on the user's machine when opening a malicious PYC file. The out-of-bounds write condition could lead to memory corruption and potential code execution in the context of the application (GitHub Advisory).
The vulnerability has been fixed in Rizin version 0.4.1. Users are advised to upgrade to this version or later. The fix was implemented through commit 68948017423a12786704e54227b8b2f918c2fd27, which addresses the out-of-bounds write issue (Gentoo Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."