{"id":"UBUNTU-CVE-2019-16718","details":"In radare2 before 3.9.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to an insufficient fix for CVE-2019-14745 and improper handling of symbol names embedded in executables.","modified":"2025-07-16T07:39:44.984462Z","published":"2019-09-23T14:15:00Z","withdrawn":"2025-07-18T16:45:21Z","upstream":["CVE-2019-16718"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-16718"},{"type":"REPORT","url":"https://github.com/radareorg/radare2/commit/5411543a310a470b1257fb93273cdd6e8dfcb3af"},{"type":"REPORT","url":"https://github.com/radareorg/radare2/commit/dd739f5a45b3af3d1f65f00fe19af1dbfec7aea7"},{"type":"REPORT","url":"https://github.com/radareorg/radare2/compare/3.8.0...3.9.0"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2019-16718"}],"affected":[{"package":{"name":"radare2","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/radare2@4.2.1+dfsg-1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.2.1+dfsg-1"}]}],"versions":["3.2.1+dfsg-5build1","4.0.0+dfsg-1"],"ecosystem_specific":{"binaries":[{"binary_version":"4.2.1+dfsg-1","binary_name":"libradare2-4.2.1"},{"binary_version":"4.2.1+dfsg-1","binary_name":"libradare2-4.2.1-dbgsym"},{"binary_version":"4.2.1+dfsg-1","binary_name":"libradare2-common"},{"binary_version":"4.2.1+dfsg-1","binary_name":"libradare2-dev"},{"binary_version":"4.2.1+dfsg-1","binary_name":"radare2"},{"binary_version":"4.2.1+dfsg-1","binary_name":"radare2-dbgsym"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-16718.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}