Vulnerability Details : CVE-2022-36044
Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to an out-of-bounds write when getting data from Luac files. A user opening a malicious Luac file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commits 07b43bc8aa1ffebd9b68d60624c9610cf7e460c7 and 05bbd147caccc60162d6fba9baaaf24befa281cd contain fixes for the issue.
Vulnerability category: Memory CorruptionExecute code
Products affected by CVE-2022-36044
- cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-36044
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 40 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-36044
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
GitHub, Inc. |
CWE ids for CVE-2022-36044
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: security-advisories@github.com (Primary)
References for CVE-2022-36044
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQZLMHEI5D7EJASA5UW6XN4ODHLRHK6N/
[SECURITY] Fedora 38 Update: cutter-re-2.2.0-1.fc38 - package-announce - Fedora Mailing-Lists
-
https://github.com/rizinorg/rizin/commit/07b43bc8aa1ffebd9b68d60624c9610cf7e460c7
fix oob read on luac · rizinorg/rizin@07b43bc · GitHubPatch;Third Party Advisory
-
https://github.com/rizinorg/rizin/security/advisories/GHSA-mqcj-82c6-gh5q
Out-of-bounds Write in Lua binary plugin · Advisory · rizinorg/rizin · GitHubThird Party Advisory
-
https://security.gentoo.org/glsa/202209-06
Rizin: Multiple Vulnerabilities (GLSA 202209-06) — Gentoo securityThird Party Advisory
-
https://github.com/rizinorg/rizin/commit/05bbd147caccc60162d6fba9baaaf24befa281cd
Fix oob read on _luac_build_info and luac memleaks · rizinorg/rizin@05bbd14 · GitHubPatch;Third Party Advisory
Jump to