{"vulnerability": "CVE-2021-43814", "sightings": [{"uuid": "1683fb3b-8eb7-4560-9383-91b11d6f91a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43814", "type": "seen", "source": "https://t.me/cibsecurity/33876", "content": "\u203c CVE-2021-43814 \u203c\n\nRizin is a UNIX-like reverse engineering framework and command-line toolset. In versions up to and including 0.3.1 there is a heap-based out of bounds write in parse_die() when reversing an AMD64 ELF binary with DWARF debug info. When a malicious AMD64 ELF binary is opened by a victim user, Rizin may crash or execute unintended actions. No workaround are known and users are advised to upgrade.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-13T22:12:12.000000Z"}]}