Radare
Products by Radare Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2023 there have been 2 vulnerabilities in Radare with an average score of 6.7 out of ten. Last year Radare had 48 security vulnerabilities published. Right now, Radare is on track to have less security vulnerabilities in 2023 than it did last year. Last year, the average CVE base score was greater by 0.30
Year | Vulnerabilities | Average Score |
---|---|---|
2023 | 2 | 6.65 |
2022 | 48 | 6.95 |
2021 | 3 | 7.60 |
2020 | 1 | 9.60 |
2019 | 8 | 7.48 |
2018 | 31 | 5.72 |
It may take a day or so for new Radare vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Radare Security Vulnerabilities
radare2 v5.8.3 was discovered to contain a segmentation fault
CVE-2023-27114
5.5 - Medium
- March 10, 2023
radare2 v5.8.3 was discovered to contain a segmentation fault via the component wasm_dis at p/wasm/wasm.c.
NULL Pointer Dereference
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository radareorg/radare2 prior to 5.8.2.
CVE-2023-0302
7.8 - High
- January 15, 2023
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository radareorg/radare2 prior to 5.8.2.
Injection
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2.
CVE-2022-4843
7.5 - High
- December 29, 2022
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2.
NULL Pointer Dereference
Integer Overflow or Wraparound in GitHub repository radareorg/radare2 prior to 5.8.0.
CVE-2022-4398
7.8 - High
- December 10, 2022
Integer Overflow or Wraparound in GitHub repository radareorg/radare2 prior to 5.8.0.
Integer Overflow or Wraparound
A segmentation fault was discovered in radare2 with adf command
CVE-2020-27795
7.5 - High
- August 19, 2022
A segmentation fault was discovered in radare2 with adf command. In libr/core/cmd_anal.c, when command "adf" has no or wrong argument, anal_fcn_data (core, input + 1) --> RAnalFunction *fcn = r_anal_get_fcn_in (core->anal, core->offset, -1); returns null pointer for fcn causing segmentation fault later in ensure_fcn_range (fcn).
Use of Uninitialized Resource
A double free issue was discovered in radare2 in cmd_info.c:cmd_info()
CVE-2020-27794
9.1 - Critical
- August 19, 2022
A double free issue was discovered in radare2 in cmd_info.c:cmd_info(). Successful exploitation could lead to modification of unexpected memory locations and potentially causing a crash.
Double-free
An off-by-one overflow flaw was found in radare2 due to mismatched array length in core_java.c
CVE-2020-27793
7.5 - High
- August 19, 2022
An off-by-one overflow flaw was found in radare2 due to mismatched array length in core_java.c. This could allow an attacker to cause a crash, and perform a denail of service attack.
off-by-five
Radare2 v5.7.0 was discovered to contain a heap buffer overflow via the function consume_encoded_name_new at format/wasm/wasm.c
CVE-2022-34502
5.5 - Medium
- July 22, 2022
Radare2 v5.7.0 was discovered to contain a heap buffer overflow via the function consume_encoded_name_new at format/wasm/wasm.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted binary file.
Buffer Overflow
Radare2 v5.7.2 was discovered to contain a NULL pointer dereference via the function r_bin_file_xtr_load_buffer at bin/bfile.c
CVE-2022-34520
5.5 - Medium
- July 22, 2022
Radare2 v5.7.2 was discovered to contain a NULL pointer dereference via the function r_bin_file_xtr_load_buffer at bin/bfile.c. This vulnerability allows attackers to cause a Denial of Service (DOS) via a crafted binary file.
NULL Pointer Dereference
Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0.
CVE-2022-1899
9.1 - Critical
- May 26, 2022
Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0.
Out-of-bounds Read
radareorg radare2 version 5.5.2 is vulnerable to NULL Pointer Dereference
CVE-2021-44974
5.5 - Medium
- May 25, 2022
radareorg radare2 version 5.5.2 is vulnerable to NULL Pointer Dereference via libr/bin/p/bin_symbols.c binary symbol parser.
NULL Pointer Dereference
radareorg radare2 5.5.2 is vulnerable to Buffer Overflow
CVE-2021-44975
5.5 - Medium
- May 24, 2022
radareorg radare2 5.5.2 is vulnerable to Buffer Overflow via /libr/core/anal_objc.c mach-o parser.
Buffer Overflow
Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0.
CVE-2022-1809
7.8 - High
- May 21, 2022
Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0.
Access of Uninitialized Pointer
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0
CVE-2022-1714
7.1 - High
- May 13, 2022
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.
Memory Corruption
Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0
CVE-2022-1649
5.5 - Medium
- May 10, 2022
Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html).
Memory Corruption
Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0
CVE-2022-1452
7.1 - High
- April 24, 2022
Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).
Out-of-bounds Read
Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0
CVE-2022-1451
7.1 - High
- April 24, 2022
Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).
Out-of-bounds Read
heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0
CVE-2022-1444
5.5 - Medium
- April 23, 2022
heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service.
Dangling pointer
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0
CVE-2022-1437
7.1 - High
- April 22, 2022
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.
Memory Corruption
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.8
CVE-2022-1382
5.5 - Medium
- April 18, 2022
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of making the radare2 crash, thus affecting the availability of the system.
NULL Pointer Dereference