Description
Rizin is a UNIX-like reverse engineering framework and command-line toolset. Prior to 0.8.2, a heap overflow can be exploited when a malicious mach0 file, having bogus entries for the dyld chained segments, is parsed by rizin. This vulnerability is fixed in 0.8.2.
Problem types
CWE-770: Allocation of Resources Without Limits or Throttling
Product status
References
github.com/.../rizin/security/advisories/GHSA-f3v7-xhmj-9cjj
github.com/rizinorg/rizin/issues/5768
github.com/rizinorg/rizin/pull/5770
github.com/...ommit/41ea75d5b07d9b41b27ae80675cdda65f1b1c989
github.com/.../librz/bin/format/mach0/mach0_chained_fixups.c
github.com/rizinorg/rizin/releases/tag/v0.8.2