RSS   Vulnerabilities for 'Ghidra'   RSS

2019-09-28
 
CVE-2019-16941

CWE-91
 

 
NSA Ghidra through 9.0.4, when experimental mode is enabled, allows arbitrary code execution if the Read XML Files feature of Bit Patterns Explorer is used with a modified XML document. This occurs in Features/BytePatterns/src/main/java/ghidra/bitpatterns/info/FileBitPatternInfoReader.java. An attack could start with an XML document that was originally created by DumpFunctionPatternInfoScript but then directly modified by an attacker (for example, to make a java.lang.Runtime.exec call).

 
2019-07-16
 
CVE-2019-13625

CWE-611
 

 
NSA Ghidra before 9.0.1 allows XXE when a project is opened or restored, or a tool is imported, as demonstrated by a project.prp file.

 
 
CVE-2019-13623

CWE-22
 

 
In NSA Ghidra through 9.0.4, path traversal can occur in RestoreTask.java (from the package ghidra.app.plugin.core.archive) via an archive with an executable file that has an initial ../ in its filename. This allows attackers to overwrite arbitrary files in scenarios where an intermediate analysis result is archived for sharing with other persons. To achieve arbitrary code execution, one approach is to overwrite some critical Ghidra modules, e.g., the decompile module.

 

 >>> Vendor: NSA 3 Products
Security-enhanced linux
Ghidra
Emissary


Copyright 2024, cxsecurity.com

 

Back to Top