CVE-2025-5645: Memory Corruption in Radare2
A vulnerability, which was classified as problematic, was found in Radare2 5.9.9. This affects the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The identifier of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added.
AI Analysis
Technical Summary
CVE-2025-5645 is a memory corruption vulnerability identified in Radare2 version 5.9.9, specifically within the function r_cons_pal_init located in the /libr/cons/pal.c file of the radiff2 component. The vulnerability arises from improper handling of the -T argument, which is an experimental parameter described as "crashy" in the documentation. When manipulated, this argument can lead to memory corruption. The attack vector is local, meaning an attacker must have local access to the system to exploit the flaw. The complexity of exploitation is high, and the exploitability is considered difficult. There is no requirement for user interaction, and the attacker needs low privileges to attempt exploitation. The vulnerability does not impact confidentiality, integrity, or availability in a significant way, as reflected by the low CVSS score of 2.0 (CVSS 4.0 vector: AV:L/AC:H/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N). The vulnerability's existence has been questioned, and no known exploits have been observed in the wild. A patch identified by commit 5705d99cc1f23f36f9a84aab26d1724010b97798 has been recommended to address the issue. Additional analysis notes that race conditions are not a concern unless AddressSanitizer (ASAN) is used, and a warning has been added to the codebase to highlight the experimental and unstable nature of the -T parameter. Overall, this vulnerability is a low-severity local memory corruption issue affecting a niche reverse engineering tool, with limited practical exploitation potential.
Potential Impact
For European organizations, the impact of CVE-2025-5645 is expected to be minimal. Radare2 is an open-source reverse engineering framework primarily used by security researchers, malware analysts, and software developers for binary analysis and debugging. Its use is specialized and not widespread in general enterprise environments. The vulnerability requires local access and low privileges, which limits the attack surface. Since exploitation is difficult and no known exploits exist in the wild, the risk of this vulnerability being leveraged in targeted attacks is low. However, organizations that rely on Radare2 for security research or incident response should be aware of the potential for local privilege escalation or denial of service if the vulnerability is exploited. The memory corruption could lead to application crashes or instability, potentially disrupting analysis workflows. Confidentiality, integrity, and availability impacts on broader organizational IT infrastructure are negligible. Overall, the threat posed by this vulnerability to European organizations is low, but it is advisable for teams using Radare2 to apply the patch to maintain tool stability and security hygiene.
Mitigation Recommendations
1. Apply the patch identified by commit 5705d99cc1f23f36f9a84aab26d1724010b97798 promptly to Radare2 version 5.9.9 or upgrade to a later version where this issue is resolved. 2. Avoid using the experimental -T parameter in Radare2 unless absolutely necessary, as it is known to be unstable and prone to causing crashes. 3. Restrict local access to systems running Radare2 to trusted users only, minimizing the risk of unauthorized exploitation. 4. Implement strict user privilege management to ensure that only authorized personnel have the ability to execute Radare2 and manipulate its parameters. 5. Monitor usage of Radare2 in your environment for unusual activity or crashes that could indicate attempted exploitation. 6. If AddressSanitizer (ASAN) is used in development or testing environments, be aware that race conditions related to this vulnerability may be more pronounced; apply additional scrutiny in these contexts. 7. Educate security and development teams about the experimental nature of certain Radare2 features and encourage cautious use.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-5645: Memory Corruption in Radare2
Description
A vulnerability, which was classified as problematic, was found in Radare2 5.9.9. This affects the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The identifier of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added.
AI-Powered Analysis
Technical Analysis
CVE-2025-5645 is a memory corruption vulnerability identified in Radare2 version 5.9.9, specifically within the function r_cons_pal_init located in the /libr/cons/pal.c file of the radiff2 component. The vulnerability arises from improper handling of the -T argument, which is an experimental parameter described as "crashy" in the documentation. When manipulated, this argument can lead to memory corruption. The attack vector is local, meaning an attacker must have local access to the system to exploit the flaw. The complexity of exploitation is high, and the exploitability is considered difficult. There is no requirement for user interaction, and the attacker needs low privileges to attempt exploitation. The vulnerability does not impact confidentiality, integrity, or availability in a significant way, as reflected by the low CVSS score of 2.0 (CVSS 4.0 vector: AV:L/AC:H/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N). The vulnerability's existence has been questioned, and no known exploits have been observed in the wild. A patch identified by commit 5705d99cc1f23f36f9a84aab26d1724010b97798 has been recommended to address the issue. Additional analysis notes that race conditions are not a concern unless AddressSanitizer (ASAN) is used, and a warning has been added to the codebase to highlight the experimental and unstable nature of the -T parameter. Overall, this vulnerability is a low-severity local memory corruption issue affecting a niche reverse engineering tool, with limited practical exploitation potential.
Potential Impact
For European organizations, the impact of CVE-2025-5645 is expected to be minimal. Radare2 is an open-source reverse engineering framework primarily used by security researchers, malware analysts, and software developers for binary analysis and debugging. Its use is specialized and not widespread in general enterprise environments. The vulnerability requires local access and low privileges, which limits the attack surface. Since exploitation is difficult and no known exploits exist in the wild, the risk of this vulnerability being leveraged in targeted attacks is low. However, organizations that rely on Radare2 for security research or incident response should be aware of the potential for local privilege escalation or denial of service if the vulnerability is exploited. The memory corruption could lead to application crashes or instability, potentially disrupting analysis workflows. Confidentiality, integrity, and availability impacts on broader organizational IT infrastructure are negligible. Overall, the threat posed by this vulnerability to European organizations is low, but it is advisable for teams using Radare2 to apply the patch to maintain tool stability and security hygiene.
Mitigation Recommendations
1. Apply the patch identified by commit 5705d99cc1f23f36f9a84aab26d1724010b97798 promptly to Radare2 version 5.9.9 or upgrade to a later version where this issue is resolved. 2. Avoid using the experimental -T parameter in Radare2 unless absolutely necessary, as it is known to be unstable and prone to causing crashes. 3. Restrict local access to systems running Radare2 to trusted users only, minimizing the risk of unauthorized exploitation. 4. Implement strict user privilege management to ensure that only authorized personnel have the ability to execute Radare2 and manipulate its parameters. 5. Monitor usage of Radare2 in your environment for unusual activity or crashes that could indicate attempted exploitation. 6. If AddressSanitizer (ASAN) is used in development or testing environments, be aware that race conditions related to this vulnerability may be more pronounced; apply additional scrutiny in these contexts. 7. Educate security and development teams about the experimental nature of certain Radare2 features and encourage cautious use.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-04T12:17:44.663Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68414aaa182aa0cae2d47303
Added to database: 6/5/2025, 7:43:38 AM
Last enriched: 7/7/2025, 3:28:11 AM
Last updated: 8/16/2025, 12:57:42 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.