Vulnerability Description
In radare 2.0.1, a memory corruption vulnerability exists in store_versioninfo_gnu_verdef() and store_versioninfo_gnu_verneed() in libr/bin/format/elf/elf.c, as demonstrated by an invalid free. This error is due to improper sh_size validation when allocating memory.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Radare | Radare2 | 2.0.1 |
Related Weaknesses (CWE)
References
- https://github.com/radare/radare2/commit/0b973e28166636e0ff1fad80baa0385c9c09c53Issue TrackingPatchThird Party Advisory
- https://github.com/radare/radare2/issues/8742ExploitIssue TrackingPatch
- https://github.com/radare/radare2/commit/0b973e28166636e0ff1fad80baa0385c9c09c53Issue TrackingPatchThird Party Advisory
- https://github.com/radare/radare2/issues/8742ExploitIssue TrackingPatch
FAQ
What is CVE-2017-16357?
CVE-2017-16357 is a vulnerability with a CVSS score of 7.8 (HIGH). In radare 2.0.1, a memory corruption vulnerability exists in store_versioninfo_gnu_verdef() and store_versioninfo_gnu_verneed() in libr/bin/format/elf/elf.c, as demonstrated by an invalid free. This e...
How severe is CVE-2017-16357?
CVE-2017-16357 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-16357?
Check the references section above for vendor advisories and patch information. Affected products include: Radare Radare2.