Description
A vulnerability, which was classified as critical, was found in rizinorg rizin up to 0.8.0. This affects the function rz_utf8_encode in the library /librz/util/utf8.c. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.298011
Permissions Required, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.298011
Exploit, Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.502345
Exploit, Issue Tracking issue-tracking
https://github.com/rizinorg/rizin/issues/4910
Issue Tracking issue-tracking
https://github.com/rizinorg/rizin/issues/4910#issuecomment-2662963253
Issue Tracking issue-tracking
patch
https://github.com/rizinorg/rizin/pull/4762
Scores
CVSS v3
5.3
EPSS
0.0003
EPSS Percentile
8.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-119
CWE-122
Status
published
Products (1)
rizin/rizin
< 0.8.0
Published
Mar 01, 2025
Tracked Since
Feb 18, 2026