CVE-2021-43814
low-risk
Published 2021-12-13
Rizin is a UNIX-like reverse engineering framework and command-line toolset. In versions up to and including 0.3.1 there is a heap-based out of bounds write in parse_die() when reversing an AMD64 ELF binary with DWARF debug info. When a malicious AMD64 ELF binary is opened by a victim user, Rizin may crash or execute unintended actions. No workaround are known and users are advised to upgrade.
Do I need to act?
-
0.25% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.7/10
High
LOCAL
/ HIGH complexity
Affected Products (1)
Affected Vendors
References (6)
Third Party Advisory
https://github.com/rizinorg/rizin/issues/2083
Third Party Advisory
https://github.com/rizinorg/rizin/security/advisories/GHSA-hqqp-vjcm-mw8r
Third Party Advisory
https://github.com/rizinorg/rizin/issues/2083
Third Party Advisory
https://github.com/rizinorg/rizin/security/advisories/GHSA-hqqp-vjcm-mw8r
26
/ 100
low-risk
Severity
20/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal