CVE-2022-36039

HIGH

Rizin <0.4.0 - Memory Corruption

Title source: llm
STIX 2.1

Description

Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to out-of-bounds write when parsing DEX files. A user opening a malicious DEX file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. A patch is available on the `dev` branch of the repository.

References (4)

Core 4
Core References
Third Party Advisory x_refsource_misc
https://github.com/rizinorg/rizin/issues/2969
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202209-06

Scores

CVSS v3 7.8
EPSS 0.0047
EPSS Percentile 64.5%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-787
Status published
Products (1)
rizin/rizin < 0.4.0
Published Sep 06, 2022
Tracked Since Feb 18, 2026