CVE-2025-1378

A vulnerability, which was classified as problematic, was found in radare2 5.9.9 33286. Affected is an unknown function in the library /libr/main/rasm2.c of the component rasm2. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0.0 is able to address this issue. The patch is identified as c6c772d2eab692ce7ada5a4227afd50c355ad545. It is recommended to upgrade the affected component.
Configurations

Configuration 1 (hide)

cpe:2.3:a:radare:radare2:5.9.9:*:*:*:*:*:*:*

History

23 Jun 2025, 14:37

Type Values Removed Values Added
CPE cpe:2.3:a:radare:radare2:5.9.9:*:*:*:*:*:*:*
References () https://github.com/radareorg/radare2/commit/c6c772d2eab692ce7ada5a4227afd50c355ad545 - () https://github.com/radareorg/radare2/commit/c6c772d2eab692ce7ada5a4227afd50c355ad545 - Patch
References () https://github.com/radareorg/radare2/issues/23953 - () https://github.com/radareorg/radare2/issues/23953 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/radareorg/radare2/issues/23953#issue-2844325926 - () https://github.com/radareorg/radare2/issues/23953#issue-2844325926 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/radareorg/radare2/milestone/86 - () https://github.com/radareorg/radare2/milestone/86 - Release Notes
References () https://vuldb.com/?ctiid.295986 - () https://vuldb.com/?ctiid.295986 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.295986 - () https://vuldb.com/?id.295986 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.498499 - () https://vuldb.com/?submit.498499 - Third Party Advisory, VDB Entry
Summary
  • (es) Se ha encontrado una vulnerabilidad clasificada como problemática en radare2 5.9.9 33286. Se trata de una función desconocida en la librería /libr/main/rasm2.c del componente rasm2. La manipulación provoca la corrupción de la memoria. El ataque debe realizarse de forma local. El exploit se ha hecho público y puede utilizarse. La actualización a la versión 6.0.0 puede solucionar este problema. El parche se identifica como c6c772d2eab692ce7ada5a4227afd50c355ad545. Se recomienda actualizar el componente afectado.
First Time Radare radare2
Radare

17 Feb 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-17 06:15

Updated : 2025-06-23 14:37


NVD link : CVE-2025-1378

Mitre link : CVE-2025-1378

CVE.ORG link : CVE-2025-1378


JSON object : View

Products Affected

radare

  • radare2
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer