rizin before v0.6.3 is vulnerable to Buffer Overflow via create_cache_bins, read_cache_accel, and rz_dyldcache_new_buf functions in librz/bin/format/mach0/dyldcache.c.
References
Configurations
History
02 Jul 2025, 20:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/rizinorg/rizin/commit/75bac3088b2ec173e22d4be9d525ceacc987cf02 - Patch | |
First Time |
Rizin rizin
Rizin |
|
CPE | cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:* |
13 Dec 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-12 18:15
Updated : 2025-07-02 20:05
NVD link : CVE-2024-31670
Mitre link : CVE-2024-31670
CVE.ORG link : CVE-2024-31670
JSON object : View
Products Affected
rizin
- rizin
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')