CVE-2024-48241

5.5 MEDIUM

📋 TL;DR

A local denial-of-service vulnerability in radare2's __bf_div function allows attackers to crash the application. This affects users running radare2 versions 5.8.0 through 5.9.4. The vulnerability requires local access to the system where radare2 is installed.

💻 Affected Systems

Products:
  • radare2
Versions: 5.8.0 through 5.9.4
Operating Systems: Linux, Windows, macOS, BSD
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected radare2 versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete radare2 process crash, potentially disrupting reverse engineering workflows and causing data loss in unsaved analysis sessions.

🟠

Likely Case

Temporary denial of service where radare2 crashes when processing malicious input, requiring restart of the application.

🟢

If Mitigated

Minimal impact with proper access controls limiting local user privileges and regular saving of analysis work.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring access to the system where radare2 runs.
🏢 Internal Only: MEDIUM - Internal users with local access could disrupt reverse engineering operations or cause productivity loss.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to trigger the vulnerable function with crafted input.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.9.5 and later

Vendor Advisory: https://github.com/radareorg/radare2/issues/23317

Restart Required: No

Instructions:

1. Update radare2 to version 5.9.5 or later using your package manager or from source. 2. For source installation: git clone https://github.com/radareorg/radare2 && cd radare2 && sys/install.sh

🔧 Temporary Workarounds

Restrict local user access

linux

Limit which users can execute radare2 on affected systems

chmod 750 /usr/bin/radare2
setfacl -m u:username:rx /usr/bin/radare2

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can run radare2
  • Monitor for radare2 process crashes and investigate suspicious local user activity

🔍 How to Verify

Check if Vulnerable:

Check radare2 version with 'r2 -v' and verify if it's between 5.8.0 and 5.9.4

Check Version:

r2 -v | grep -o 'radare2 [0-9.]*'

Verify Fix Applied:

Verify radare2 version is 5.9.5 or later with 'r2 -v'

📡 Detection & Monitoring

Log Indicators:

  • radare2 process crashes
  • segmentation fault errors in system logs
  • abnormal termination of radare2

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

process.name:"radare2" AND event.action:"process_end" AND event.outcome:"failure"

🔗 References

📤 Share & Export