Input Validation Flaw in Radare2 Affects Resource Management
CVE-2021-3673

7.5HIGH

Key Information:

Vendor

Radare

Status
Vendor
CVE Published:
2 August 2021

What is CVE-2021-3673?

An improper input validation vulnerability was identified in Radare2 version 5.3.1, which could be exploited when reading a specially crafted Little Endian (LE) binary. This flaw can lead to resource exhaustion, potentially resulting in a Denial of Service (DoS) condition. Attackers may leverage this vulnerability to affect the availability of services utilizing Radare2, necessitating prompt attention and remediation.

Affected Version(s)

radare2 Radare2 version 5.3.1

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.