
Cloud Vulnerability DB
A community-led vulnerabilities database
A Buffer Overflow vulnerability was discovered in radare2 version 5.8.8, identified as CVE-2024-29646. The vulnerability allows an attacker to execute arbitrary code via the name, type, or group fields (NVD, Debian). The issue was disclosed on December 17, 2024, and received a CVSS v3.1 base score of 9.8 CRITICAL from CISA-ADP (NVD).
The vulnerability is classified as a Classic Buffer Overflow (CWE-120) that occurs due to buffer copy operations without proper size checking. The issue specifically affects the parsing of name, type, and group fields in radare2 v5.8.8, where insufficient bounds checking could lead to buffer overflow conditions (GitHub). The vulnerability was addressed through multiple pull requests that implemented safer string handling mechanisms, including the introduction of r_str_scanf as a secure alternative to the standard scanf function (GitHub PR).
The vulnerability allows attackers to execute arbitrary code on affected systems, potentially leading to complete system compromise. Given the CVSS score of 9.8, this is considered a critical severity issue with high impact potential across confidentiality, integrity, and availability (NVD).
The vulnerability has been fixed in radare2 version 5.9.0 and later releases. The fix includes implementation of safer string handling mechanisms through multiple pull requests that address the buffer overflow issues (GitHub PR, GitHub PR). Users are advised to upgrade to version 5.9.0 or later to mitigate this vulnerability.
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."