CVE-2024-29646

Buffer Overflow vulnerability in radarorg radare2 v.5.8.8 allows an attacker to execute arbitrary code via the name, type, or group fields.
References
Link Resource
https://gist.github.com/Crispy-fried-chicken/0be4a204e7226fa2cea761c09f027690 Third Party Advisory
https://github.com/radareorg/radare2/pull/22562 Issue Tracking Vendor Advisory Patch
https://github.com/radareorg/radare2/pull/22567 Issue Tracking Vendor Advisory Patch
https://github.com/radareorg/radare2/pull/22572 Issue Tracking Vendor Advisory Patch
https://github.com/radareorg/radare2/pull/22578 Issue Tracking Vendor Advisory Patch
https://github.com/radareorg/radare2/pull/22599 Issue Tracking Vendor Advisory Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:radare:radare2:5.8.8:*:*:*:*:*:*:*

History

17 Jun 2025, 01:44

Type Values Removed Values Added
CPE cpe:2.3:a:radare:radare2:5.8.8:*:*:*:*:*:*:*
First Time Radare radare2
Radare
Summary
  • (es) La vulnerabilidad de desbordamiento de búfer en radarorg radare2 v.5.8.8 permite a un atacante ejecutar código arbitrario a través de los campos de nombre, tipo o grupo.
References () https://gist.github.com/Crispy-fried-chicken/0be4a204e7226fa2cea761c09f027690 - () https://gist.github.com/Crispy-fried-chicken/0be4a204e7226fa2cea761c09f027690 - Third Party Advisory
References () https://github.com/radareorg/radare2/pull/22562 - () https://github.com/radareorg/radare2/pull/22562 - Issue Tracking, Vendor Advisory, Patch
References () https://github.com/radareorg/radare2/pull/22567 - () https://github.com/radareorg/radare2/pull/22567 - Issue Tracking, Vendor Advisory, Patch
References () https://github.com/radareorg/radare2/pull/22572 - () https://github.com/radareorg/radare2/pull/22572 - Issue Tracking, Vendor Advisory, Patch
References () https://github.com/radareorg/radare2/pull/22578 - () https://github.com/radareorg/radare2/pull/22578 - Issue Tracking, Vendor Advisory, Patch
References () https://github.com/radareorg/radare2/pull/22599 - () https://github.com/radareorg/radare2/pull/22599 - Issue Tracking, Vendor Advisory, Patch

18 Dec 2024, 16:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-120

17 Dec 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-17 22:15

Updated : 2025-06-17 01:44


NVD link : CVE-2024-29646

Mitre link : CVE-2024-29646

CVE.ORG link : CVE-2024-29646


JSON object : View

Products Affected

radare

  • radare2
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')