In radare2 before 3.7.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to improper handling of symbol names embedded in executables.
References
Link | Resource |
---|---|
https://github.com/radare/radare2/releases/tag/3.7.0 | Release Notes |
https://github.com/radare/radare2/pull/14690 | Patch Third Party Advisory |
https://bananamafia.dev/post/r2-pwndebian/ | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQO7V37RGQEKZDLY2JYKDZTLNN2YUBC5/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGA2PVBFA6VPWWLMBGWVBESHAJBQ7OXJ/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ETWG4VKHWL5F74L3QBBKSCOXHSRNSRRT/ | Mailing List Third Party Advisory |
Information
Published : 2019-08-07 08:15
Updated : 2023-03-03 09:40
NVD link : CVE-2019-14745
Mitre link : CVE-2019-14745
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
radare
- radare2
fedoraproject
- fedora