A vulnerability, which was classified as critical, was found in rizinorg rizin up to 0.8.0. This affects the function rz_utf8_encode in the library /librz/util/utf8.c. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
References
| Link | Resource |
|---|---|
| https://github.com/rizinorg/rizin/issues/4910 | Exploit Issue Tracking |
| https://github.com/rizinorg/rizin/issues/4910#issuecomment-2662963253 | Issue Tracking |
| https://github.com/rizinorg/rizin/pull/4762 | Issue Tracking |
| https://github.com/user-attachments/files/18817099/rz-bin-poc-01.zip | Exploit |
| https://vuldb.com/?ctiid.298011 | Permissions Required VDB Entry |
| https://vuldb.com/?id.298011 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.502345 | Exploit Third Party Advisory VDB Entry |
| https://github.com/rizinorg/rizin/issues/4910#issuecomment-2662963253 | Issue Tracking |
Configurations
History
No history.
Information
Published : 2025-03-01 13:15
Updated : 2025-08-25 18:29
NVD link : CVE-2025-1788
Mitre link : CVE-2025-1788
CVE.ORG link : CVE-2025-1788
JSON object : View
Products Affected
rizin
- rizin
