CVE-2025-5646: Memory Corruption in Radare2
A vulnerability has been found in Radare2 5.9.9 and classified as problematic. This vulnerability affects the function r_cons_rainbow_free in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is identified as 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added.
AI Analysis
Technical Summary
CVE-2025-5646 is a memory corruption vulnerability identified in Radare2 version 5.9.9, specifically within the function r_cons_rainbow_free located in the /libr/cons/pal.c component of radiff2. The vulnerability arises from improper handling of the -T argument, which is documented as experimental and prone to causing crashes. Exploitation involves manipulating this argument to trigger memory corruption. The attack vector is local, requiring the attacker to have access to the host system. The complexity of exploitation is considered high, and the exploit is difficult to execute reliably. Additionally, the vulnerability's real-world existence has been questioned, and no known exploits are currently active in the wild. A patch has been committed (identified by commit 5705d99cc1f23f36f9a84aab26d1724010b97798) to address this issue. The vulnerability does not require user interaction or network access, and it does not escalate privileges or affect confidentiality, integrity, or availability significantly. The CVSS 4.0 score is 2, reflecting a low severity rating. The vulnerability is mainly relevant to users who utilize the experimental -T parameter in Radare2, a reverse engineering framework commonly used for binary analysis and debugging.
Potential Impact
For European organizations, the impact of CVE-2025-5646 is minimal due to several factors. Radare2 is primarily a tool used by security researchers, reverse engineers, and developers rather than a core component of enterprise infrastructure. The vulnerability requires local access and the use of an experimental feature, limiting the attack surface. Consequently, it is unlikely to be exploited in large-scale attacks or cause significant disruption. However, organizations that rely on Radare2 for security assessments or malware analysis should be aware of this vulnerability to avoid potential crashes or instability during their workflows. The low severity and lack of known exploits reduce the urgency, but patching remains advisable to maintain tool reliability and security hygiene.
Mitigation Recommendations
Organizations using Radare2 should update to a patched version that includes the fix identified by commit 5705d99cc1f23f36f9a84aab26d1724010b97798. Users should avoid using the experimental -T parameter until the patch is applied, as it is the root cause of the memory corruption. Additionally, restricting Radare2 usage to trusted users and environments can minimize the risk of local exploitation. Implementing strict access controls and monitoring for unusual local activity related to Radare2 can further reduce exposure. Security teams should also educate users about the risks of using experimental features in security tools and encourage adherence to stable releases. Regularly reviewing and updating reverse engineering tools as part of vulnerability management processes is recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-5646: Memory Corruption in Radare2
Description
A vulnerability has been found in Radare2 5.9.9 and classified as problematic. This vulnerability affects the function r_cons_rainbow_free in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is identified as 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added.
AI-Powered Analysis
Technical Analysis
CVE-2025-5646 is a memory corruption vulnerability identified in Radare2 version 5.9.9, specifically within the function r_cons_rainbow_free located in the /libr/cons/pal.c component of radiff2. The vulnerability arises from improper handling of the -T argument, which is documented as experimental and prone to causing crashes. Exploitation involves manipulating this argument to trigger memory corruption. The attack vector is local, requiring the attacker to have access to the host system. The complexity of exploitation is considered high, and the exploit is difficult to execute reliably. Additionally, the vulnerability's real-world existence has been questioned, and no known exploits are currently active in the wild. A patch has been committed (identified by commit 5705d99cc1f23f36f9a84aab26d1724010b97798) to address this issue. The vulnerability does not require user interaction or network access, and it does not escalate privileges or affect confidentiality, integrity, or availability significantly. The CVSS 4.0 score is 2, reflecting a low severity rating. The vulnerability is mainly relevant to users who utilize the experimental -T parameter in Radare2, a reverse engineering framework commonly used for binary analysis and debugging.
Potential Impact
For European organizations, the impact of CVE-2025-5646 is minimal due to several factors. Radare2 is primarily a tool used by security researchers, reverse engineers, and developers rather than a core component of enterprise infrastructure. The vulnerability requires local access and the use of an experimental feature, limiting the attack surface. Consequently, it is unlikely to be exploited in large-scale attacks or cause significant disruption. However, organizations that rely on Radare2 for security assessments or malware analysis should be aware of this vulnerability to avoid potential crashes or instability during their workflows. The low severity and lack of known exploits reduce the urgency, but patching remains advisable to maintain tool reliability and security hygiene.
Mitigation Recommendations
Organizations using Radare2 should update to a patched version that includes the fix identified by commit 5705d99cc1f23f36f9a84aab26d1724010b97798. Users should avoid using the experimental -T parameter until the patch is applied, as it is the root cause of the memory corruption. Additionally, restricting Radare2 usage to trusted users and environments can minimize the risk of local exploitation. Implementing strict access controls and monitoring for unusual local activity related to Radare2 can further reduce exposure. Security teams should also educate users about the risks of using experimental features in security tools and encourage adherence to stable releases. Regularly reviewing and updating reverse engineering tools as part of vulnerability management processes is recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-04T12:20:36.128Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 684151b1182aa0cae2d5725e
Added to database: 6/5/2025, 8:13:37 AM
Last enriched: 7/7/2025, 3:28:34 AM
Last updated: 8/18/2025, 11:34:14 PM
Views: 20
Related Threats
CVE-2025-50864: n/a
UnknownCVE-2025-51991: n/a
UnknownCVE-2025-51990: n/a
UnknownCVE-2025-55482: n/a
HighCVE-2025-43748: CWE-352 Cross-Site Request Forgery (CSRF) in Liferay Portal
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.