CVE-2023-27590

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-27590
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-27590.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-27590
Related
  • GHSA-rqcp-m8m2-jcqf
Published
2023-03-14T21:15:10Z
Modified
2025-01-14T20:30:53Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Rizin is a UNIX-like reverse engineering framework and command-line toolset. In version 0.5.1 and prior, converting a GDB registers profile file into a Rizin register profile can result in a stack-based buffer overflow when the name, type, or groups fields have longer values than expected. Users opening untrusted GDB registers files (e.g. with the drpg or arpg commands) are affected by this flaw. Commit d6196703d89c84467b600ba2692534579dc25ed4 contains a patch for this issue. As a workaround, review the GDB register profiles before loading them with drpg/arpg commands.

References

Affected packages

Git / github.com/rizinorg/rizin

Affected ranges

Type
GIT
Repo
https://github.com/rizinorg/rizin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed