Description
Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to an out-of-bounds write when getting data from Luac files. A user opening a malicious Luac file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commits 07b43bc8aa1ffebd9b68d60624c9610cf7e460c7 and 05bbd147caccc60162d6fba9baaaf24befa281cd contain fixes for the issue.
References (5)
Core 5
Core References
Patch, Third Party Advisory
https://github.com/rizinorg/rizin/commit/05bbd147caccc60162d6fba9baaaf24befa281cd
Patch, Third Party Advisory
https://github.com/rizinorg/rizin/commit/07b43bc8aa1ffebd9b68d60624c9610cf7e460c7
Third Party Advisory
https://github.com/rizinorg/rizin/security/advisories/GHSA-mqcj-82c6-gh5q
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202209-06
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQZLMHEI5D7EJASA5UW6XN4ODHLRHK6N/
Scores
CVSS v3
7.8
EPSS
0.0055
EPSS Percentile
68.0%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-787
Status
published
Products (1)
rizin/rizin
< 0.4.0
Published
Sep 06, 2022
Tracked Since
Feb 18, 2026