Vulnerability Details : CVE-2020-16269
radare2 4.5.0 misparses DWARF information in executable files, causing a segmentation fault in parse_typedef in type_dwarf.c via a malformed DW_AT_name in the .debug_info section.
Vulnerability category: Memory Corruption
Products affected by CVE-2020-16269
- cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
- cpe:2.3:a:radare:radare2:4.5.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-16269
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 32 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-16269
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
References for CVE-2020-16269
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45SGGCWFIIV7N2X2QZRREHOW7ODT3IH7/
[SECURITY] Fedora 32 Update: radare2-5.1.1-1.fc32 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
https://github.com/radareorg/radare2/issues/17383
[ELF] Segmentation fault by opening a binary (Bug in DWARF parsing) · Issue #17383 · radareorg/radare2 · GitHubExploit;Patch;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZJET3RR6W7LAK4H6VPTMAZS24W7XYHRZ/
[SECURITY] Fedora 33 Update: radare2-5.1.1-1.fc33 - package-announce - Fedora Mailing-ListsThird Party Advisory
Jump to