Description
Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to out-of-bounds write when parsing DEX files. A user opening a malicious DEX file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. A patch is available on the `dev` branch of the repository.
References (4)
Core 4
Core References
Third Party Advisory x_refsource_confirm
https://github.com/rizinorg/rizin/security/advisories/GHSA-pr85-hv85-45pg
Third Party Advisory x_refsource_misc
https://github.com/rizinorg/rizin/issues/2969
Patch, Third Party Advisory x_refsource_misc
https://github.com/rizinorg/rizin/commit/1524f85211445e41506f98180f8f69f7bf115406
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/202209-06
Scores
CVSS v3
7.8
EPSS
0.0047
EPSS Percentile
64.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-787
Status
published
Products (1)
rizin/rizin
< 0.4.0
Published
Sep 06, 2022
Tracked Since
Feb 18, 2026