CVE-2023-27590
Published on: Not Yet Published
Last Modified on: 03/21/2023 03:00:00 PM UTC
Certain versions of Rizin from Rizin contain the following vulnerability:
Rizin is a UNIX-like reverse engineering framework and command-line toolset. In version 0.5.1 and prior, converting a GDB registers profile file into a Rizin register profile can result in a stack-based buffer overflow when the `name`, `type`, or `groups` fields have longer values than expected. Users opening untrusted GDB registers files (e.g. with the `drpg` or `arpg` commands) are affected by this flaw. Commit d6196703d89c84467b600ba2692534579dc25ed4 contains a patch for this issue. As a workaround, review the GDB register profiles before loading them with `drpg`/`arpg` commands.
- CVE-2023-27590 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
- Affected Vendor/Software:
rizinorg - rizin version = <= 0.5.1
CVSS3 Score: 7.8 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | NONE | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Fix conversion from GDB register profile to rizin profile by ret2libc · Pull Request #3422 · rizinorg/rizin · GitHub | github.com text/html |
![]() |
Stack-based buffer overflow when parsing GDB registers profile files · Advisory · rizinorg/rizin · GitHub | github.com text/html |
![]() |
Fix conversion from GDB register profile to rizin profile · rizinorg/[email protected] · GitHub | github.com text/html |
![]() |
rizin/profile.c at 3a7d5116244beb678ad9950bb9dd27d28ed2691f · rizinorg/rizin · GitHub | github.com text/html |
![]() |
rizin/profile.c at 3a7d5116244beb678ad9950bb9dd27d28ed2691f · rizinorg/rizin · GitHub | github.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Rizin | Rizin | All | All | All | All |
- cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|