Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to an out-of-bounds write when getting data from dyld cache files. A user opening a malicious dyld cache file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit number 556ca2f9eef01ec0f4a76d1fbacfcf3a87a44810 contains a patch.
{
"cwe_ids": [
"CWE-787"
]
}[
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"202742299683610710236793739798202841987",
"198391192752900046676997905028604354390",
"206473360849767553133210947706748328536",
"219195630943982412955608641399309474740",
"42800548817751478398180574136726924706",
"107769310666648727572487431769883391471",
"99927024419835252122904847960256268147",
"157546792273115299425856008154257979500"
]
},
"target": {
"file": "librz/bin/format/mach0/dyldcache.c"
},
"signature_version": "v1",
"id": "CVE-2022-36042-35062ac4",
"deprecated": false,
"source": "https://github.com/rizinorg/rizin/commit/556ca2f9eef01ec0f4a76d1fbacfcf3a87a44810"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "171822682323094913757555923528189234447",
"length": 2226.0
},
"target": {
"file": "librz/bin/format/mach0/dyldcache.c",
"function": "get_rebase_infos"
},
"signature_version": "v1",
"id": "CVE-2022-36042-9a6752ac",
"deprecated": false,
"source": "https://github.com/rizinorg/rizin/commit/556ca2f9eef01ec0f4a76d1fbacfcf3a87a44810"
}
]