Our team’s vulnerability disclosures 2021

At Faraday, we are part of the open-source community. Our product relies on various open-source projects, and it is released under the GNU General Public License. Fortunately, these practices are becoming more common and, with them, open-source software is increasing its presence in data centers, consumer devices, and applications.
But this can have its drawbacks, too, as this xkcd comic illustrates. In particular, some of the software we use daily does not have security in mind. In many cases, these tools started as small side projects or weekend experiments, and their creators did not foresee the popularity they might achieve in the future. Regardless of why this happens, and after reflecting on this, our research team started a new quest to find and report vulnerabilities in the open-source projects we use every day.
These are the vulnerabilities we’ve disclosed during 2021
– CVE-2021–4021: Uncontrolled resource consumption via specially crafted ELF64 binary for MIPS architecture in radare2.
– CVE-2021–4022: Segfault when analyzing an ELF64 for HPPA architecture in rizin.
– CVE-2021–43814: Heap-based OOB write when parsing dwarf DIE info in Rizin.
– CVE-2021–4166: Out-of-bounds Read while loading session in vim.
– CVE-2021–4192: Use After Free while loading session in vim.
– CVE-2021–4193: Out-of-bounds Read while loading session in vim.
Related Posts
May 30, 2025
11 años de ciberseguridad: Kali y Faraday. Crecer en comunidad, crecer en ciberseguridad
Trabajar con Kali nos exigió subir la vara, mejorar nuestros procesos de desarrollo, estar siempre atentos a los cambios, mantener el…
May 27, 2025
Automation and Pentesting: Use AI and Open-Source Tools
This article aims to combine automation and pentesting methodologies in a practical way, using artificial intelligence and multiple…
May 5, 2025
Release v5.13
This release includes numerous bug fixes and addresses several feature requests from our users. One of the key updates is the addition of a…