
Cloud Vulnerability DB
A community-led vulnerabilities database
An out-of-bounds read vulnerability was discovered in radare2 version 5.8.9 and earlier versions. The vulnerability exists in the print_insn32 function within the libr/arch/p/nds32/nds32-dis.h file (NVD, MITRE).
The vulnerability is classified as a global-buffer-overflow that occurs in the printinsn32 function. When analyzing binary files, the function attempts to read data past the end of the intended buffer, specifically 40 bytes to the left of the global variable 'mnemonicmem' and 8 bytes to the right of the global variable 'mnemonic_br2'. The issue has been assigned a CVSS v3.1 base score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) (NVD, GitHub POC).
This out-of-bounds read vulnerability could allow attackers to read sensitive information from other memory locations or cause a denial of service through application crashes (GitHub POC).
Users are advised to update to radare2 version 5.9.0 or newer to address this vulnerability. The issue has been fixed in the source code through a commit that addresses the buffer overflow problem (GitHub POC).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."