Unrated severityNVD Advisory· Published Mar 14, 2023· Updated Feb 25, 2025
Rizin has stack-based buffer overflow when parsing GDB registers profile files
CVE-2023-27590
Description
Rizin is a UNIX-like reverse engineering framework and command-line toolset. In version 0.5.1 and prior, converting a GDB registers profile file into a Rizin register profile can result in a stack-based buffer overflow when the name, type, or groups fields have longer values than expected. Users opening untrusted GDB registers files (e.g. with the drpg or arpg commands) are affected by this flaw. Commit d6196703d89c84467b600ba2692534579dc25ed4 contains a patch for this issue. As a workaround, review the GDB register profiles before loading them with drpg/arpg commands.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/rizinorg/rizin/blob/3a7d5116244beb678ad9950bb9dd27d28ed2691f/librz/reg/profile.cmitrex_refsource_MISC
- github.com/rizinorg/rizin/blob/3a7d5116244beb678ad9950bb9dd27d28ed2691f/librz/reg/profile.cmitrex_refsource_MISC
- github.com/rizinorg/rizin/commit/d6196703d89c84467b600ba2692534579dc25ed4mitrex_refsource_MISC
- github.com/rizinorg/rizin/pull/3422mitrex_refsource_MISC
- github.com/rizinorg/rizin/security/advisories/GHSA-rqcp-m8m2-jcqfmitrex_refsource_CONFIRM
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WW3JXI4TIJIR7PGFP74SN7GQYHW2F46Y/mitre
News mentions
0No linked articles in our index yet.