Vulnerability Description
Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Radare | Radare2 | < 5.7.0 |
Related Weaknesses (CWE)
References
- https://github.com/radareorg/radare2/commit/ecc44b6a2f18ee70ac133365de0e509d26d5PatchThird Party Advisory
- https://huntr.dev/bounties/c8f4c2de-7d96-4ad4-857a-c099effca2d6ExploitIssue TrackingPatch
- https://github.com/radareorg/radare2/commit/ecc44b6a2f18ee70ac133365de0e509d26d5PatchThird Party Advisory
- https://huntr.dev/bounties/c8f4c2de-7d96-4ad4-857a-c099effca2d6ExploitIssue TrackingPatch
FAQ
What is CVE-2022-1452?
CVE-2022-1452 is a vulnerability with a CVSS score of 7.1 (HIGH). Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. T...
How severe is CVE-2022-1452?
CVE-2022-1452 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-1452?
Check the references section above for vendor advisories and patch information. Affected products include: Radare Radare2.