CVE-2025-5648: Memory Corruption in Radare2
A vulnerability was found in Radare2 5.9.9. It has been classified as problematic. Affected is the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. An attack has to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added.
AI Analysis
Technical Summary
CVE-2025-5648 is a memory corruption vulnerability identified in Radare2 version 5.9.9, specifically within the function r_cons_pal_init located in the /libr/cons/pal.c file of the radiff2 component. The vulnerability arises from improper handling of the '-T' argument, which is an experimental parameter known to be unstable and potentially crash-inducing. When this argument is manipulated, it can lead to memory corruption. Exploitation requires local access to the system, and the attack complexity is considered high due to the difficulty in reliably triggering the vulnerability. Furthermore, the exploitability is low, and no user interaction or authentication bypass is involved. The vulnerability has been publicly disclosed, but its practical existence and impact remain somewhat uncertain, as indicated by the note that the race condition is not a significant issue unless AddressSanitizer (ASAN) is used. A patch has been committed (identified by commit hash 5705d99cc1f23f36f9a84aab26d1724010b97798) to address this issue, and a warning has been added to the documentation to highlight the experimental and unstable nature of the '-T' parameter. The CVSS 4.0 base score is 2.0, reflecting a low severity rating, with attack vector limited to local (AV:L), high attack complexity (AC:H), and requiring low privileges (PR:L). No known exploits are currently active in the wild.
Potential Impact
For European organizations, the impact of this vulnerability is limited due to several factors. Radare2 is primarily a reverse engineering and binary analysis tool used by security researchers, developers, and malware analysts rather than a widespread production system component. The requirement for local access and the high complexity of exploitation further reduce the risk of this vulnerability being leveraged in targeted attacks. However, organizations with security teams or researchers using Radare2 internally could face potential risks if untrusted users gain local access to systems running the vulnerable version. Exploitation could lead to memory corruption, potentially causing application crashes or, in rare cases, arbitrary code execution, which might compromise the confidentiality or integrity of analysis environments. Given the low severity and the niche usage of Radare2, the overall threat to European enterprises is minimal but should not be ignored in environments where Radare2 is actively used.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should ensure that all instances of Radare2 are updated to versions beyond 5.9.9 where the patch addressing CVE-2025-5648 has been applied. Since the '-T' parameter is experimental and known to be unstable, users should avoid using this argument unless absolutely necessary and only in controlled environments. Access controls should be enforced to restrict local access to systems running Radare2, limiting the potential for exploitation by unauthorized users. Additionally, organizations should monitor and audit usage of Radare2 to detect any unusual activity involving the '-T' parameter. Security teams should educate users about the risks associated with experimental features in security tools and encourage the use of stable releases. Employing runtime protections such as AddressSanitizer during development and testing can help detect memory corruption issues early, although it is noted that the race condition is primarily a concern under ASAN. Finally, maintaining a robust patch management process to promptly apply updates is essential.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-5648: Memory Corruption in Radare2
Description
A vulnerability was found in Radare2 5.9.9. It has been classified as problematic. Affected is the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. An attack has to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added.
AI-Powered Analysis
Technical Analysis
CVE-2025-5648 is a memory corruption vulnerability identified in Radare2 version 5.9.9, specifically within the function r_cons_pal_init located in the /libr/cons/pal.c file of the radiff2 component. The vulnerability arises from improper handling of the '-T' argument, which is an experimental parameter known to be unstable and potentially crash-inducing. When this argument is manipulated, it can lead to memory corruption. Exploitation requires local access to the system, and the attack complexity is considered high due to the difficulty in reliably triggering the vulnerability. Furthermore, the exploitability is low, and no user interaction or authentication bypass is involved. The vulnerability has been publicly disclosed, but its practical existence and impact remain somewhat uncertain, as indicated by the note that the race condition is not a significant issue unless AddressSanitizer (ASAN) is used. A patch has been committed (identified by commit hash 5705d99cc1f23f36f9a84aab26d1724010b97798) to address this issue, and a warning has been added to the documentation to highlight the experimental and unstable nature of the '-T' parameter. The CVSS 4.0 base score is 2.0, reflecting a low severity rating, with attack vector limited to local (AV:L), high attack complexity (AC:H), and requiring low privileges (PR:L). No known exploits are currently active in the wild.
Potential Impact
For European organizations, the impact of this vulnerability is limited due to several factors. Radare2 is primarily a reverse engineering and binary analysis tool used by security researchers, developers, and malware analysts rather than a widespread production system component. The requirement for local access and the high complexity of exploitation further reduce the risk of this vulnerability being leveraged in targeted attacks. However, organizations with security teams or researchers using Radare2 internally could face potential risks if untrusted users gain local access to systems running the vulnerable version. Exploitation could lead to memory corruption, potentially causing application crashes or, in rare cases, arbitrary code execution, which might compromise the confidentiality or integrity of analysis environments. Given the low severity and the niche usage of Radare2, the overall threat to European enterprises is minimal but should not be ignored in environments where Radare2 is actively used.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should ensure that all instances of Radare2 are updated to versions beyond 5.9.9 where the patch addressing CVE-2025-5648 has been applied. Since the '-T' parameter is experimental and known to be unstable, users should avoid using this argument unless absolutely necessary and only in controlled environments. Access controls should be enforced to restrict local access to systems running Radare2, limiting the potential for exploitation by unauthorized users. Additionally, organizations should monitor and audit usage of Radare2 to detect any unusual activity involving the '-T' parameter. Security teams should educate users about the risks associated with experimental features in security tools and encourage the use of stable releases. Employing runtime protections such as AddressSanitizer during development and testing can help detect memory corruption issues early, although it is noted that the race condition is primarily a concern under ASAN. Finally, maintaining a robust patch management process to promptly apply updates is essential.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-04T12:26:16.698Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68415fd9182aa0cae2d772c7
Added to database: 6/5/2025, 9:14:01 AM
Last enriched: 7/7/2025, 3:40:12 AM
Last updated: 7/30/2025, 4:12:56 PM
Views: 10
Related Threats
CVE-2025-8959: CWE-59: Improper Link Resolution Before File Access (Link Following) in HashiCorp Shared library
HighCVE-2025-44201
LowCVE-2025-36088: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Storage TS4500 Library
MediumCVE-2025-43490: CWE-59 Improper Link Resolution Before File Access ('Link Following') in HP, Inc. HP Hotkey Support Software
MediumCVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.