Source |
CVE Liste |
Identifiant |
8318654 |
Date de publication |
2023-03-14 21:15:10 (vue: 2023-03-14 23:06:59) |
Titre |
CVE-2023-27590 |
Texte |
Rizin is a UNIX-like reverse engineering framework and command-line toolset. In version 0.5.1 and prior, converting a GDB registers profile file into a Rizin register profile can result in a stack-based buffer overflow when the `name`, `type`, or `groups` fields have longer values than expected. Users opening untrusted GDB registers files (e.g. with the `drpg` or `arpg` commands) are affected by this flaw. Commit d6196703d89c84467b600ba2692534579dc25ed4 contains a patch for this issue. As a workaround, review the GDB register profiles before loading them with `drpg`/`arpg` commands. |
Notes |
|
Envoyé |
Oui |
Condensat |
2023 27590 `arpg` `drpg` `drpg`/`arpg` `groups` `name` `type` affected are based before buffer can command commands commit contains converting cve d6196703d89c84467b600ba2692534579dc25ed4 engineering expected fields file files flaw framework gdb have issue like line loading longer opening overflow patch prior profile profiles register registers result reverse review rizin stack than them toolset unix untrusted users values version when workaround |
Tags |
|
Stories |
|
Move |
|