Vulnerability Details : CVE-2022-36043
Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to a double free in bobj.c:rz_bin_reloc_storage_free() when freeing relocations generated from qnx binary plugin. A user opening a malicious qnx binary could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit number a3d50c1ea185f3f642f2d8180715f82d98840784 contains a patch for this issue.
Vulnerability category: Memory CorruptionExecute code
Products affected by CVE-2022-36043
- cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-36043
0.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 28 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-36043
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
GitHub, Inc. |
CWE ids for CVE-2022-36043
-
The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.Assigned by:
- nvd@nist.gov (Secondary)
- security-advisories@github.com (Primary)
References for CVE-2022-36043
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQZLMHEI5D7EJASA5UW6XN4ODHLRHK6N/
[SECURITY] Fedora 38 Update: cutter-re-2.2.0-1.fc38 - package-announce - Fedora Mailing-Lists
-
https://security.gentoo.org/glsa/202209-06
Rizin: Multiple Vulnerabilities (GLSA 202209-06) — Gentoo securityThird Party Advisory
-
https://github.com/rizinorg/rizin/commit/a3d50c1ea185f3f642f2d8180715f82d98840784
fix #2964 - double-free in bin_qnx.c · rizinorg/rizin@a3d50c1 · GitHubPatch;Third Party Advisory
-
https://github.com/rizinorg/rizin/issues/2964
double-free in bobj.c · Issue #2964 · rizinorg/rizin · GitHubThird Party Advisory
-
https://github.com/rizinorg/rizin/security/advisories/GHSA-rjhv-mj4g-j4p5
Double Free in bobj.c when using QNX binary plugin · Advisory · rizinorg/rizin · GitHubThird Party Advisory
Jump to