CVE-2022-36040

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-36040
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-36040.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-36040
Aliases
  • GHSA-h897-rhm9-rpmw
Published
2022-09-06T00:00:00Z
Modified
2025-11-04T19:33:53Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Rizin Out-of-bounds Write vulnerability in pyc/marshal.c
Details

Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to an out-of-bounds write when getting data from PYC(python) files. A user opening a malicious PYC file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit number 68948017423a12786704e54227b8b2f918c2fd27 contains a patch.

Database specific
{
    "cwe_ids": [
        "CWE-787"
    ]
}
References

Affected packages

Git / github.com/rizinorg/rizin

Affected ranges

Type
GIT
Repo
https://github.com/rizinorg/rizin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

vanir_signatures

[
    {
        "signature_type": "Function",
        "digest": {
            "function_hash": "72458637873801972653470581717360473393",
            "length": 1154.0
        },
        "target": {
            "file": "librz/bin/format/pyc/marshal.c",
            "function": "get_complex_object"
        },
        "signature_version": "v1",
        "id": "CVE-2022-36040-6537e996",
        "deprecated": false,
        "source": "https://github.com/rizinorg/rizin/commit/68948017423a12786704e54227b8b2f918c2fd27"
    },
    {
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "82261749963884352064761051487121887822",
                "228268872496510562546183714163607576222",
                "199466917720915328768596104141075825853",
                "293482853746269340502531165291506837508",
                "140999574085095719459912485404339349722",
                "116412659685932707513396615129518789484",
                "173925645218753159051339930150842507044",
                "312678228229500263673679713722502109697",
                "68626622871899505520720809438743105521",
                "151776157733578431625676153769401840921",
                "136916274336501706032085600434429911593",
                "311877571123002377407786169711506545989",
                "261076102413676695034074526986463750302",
                "292817559914706842946213124231108447799",
                "239081205955742708329577561677706450353",
                "203515982502618665553204445678132622747",
                "85884461731748264322993589370992014696",
                "243075124111099643022453739273065865248",
                "318682926191024384660535147717027302238",
                "101345095486902603108522056330809211919",
                "320471860538681276076444384901723410039",
                "204701611301982111874660282145742224988",
                "222056925131123246676957947244190969287",
                "160754004593734786832102050938434667205"
            ]
        },
        "target": {
            "file": "librz/bin/format/pyc/marshal.c"
        },
        "signature_version": "v1",
        "id": "CVE-2022-36040-7b35c5b5",
        "deprecated": false,
        "source": "https://github.com/rizinorg/rizin/commit/68948017423a12786704e54227b8b2f918c2fd27"
    }
]