Vulnerability Description
An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption vulnerability resulting from infinite recursion in the functions d_name(), d_encoding(), and d_local_name() in cp-demangle.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via an ELF file, as demonstrated by nm.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Binutils | 2.31 |
Related Weaknesses (CWE)
References
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681ExploitIssue TrackingVendor Advisory
- https://usn.ubuntu.com/4326-1/
- https://usn.ubuntu.com/4336-1/
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681ExploitIssue TrackingVendor Advisory
- https://usn.ubuntu.com/4326-1/
- https://usn.ubuntu.com/4336-1/
FAQ
What is CVE-2018-18700?
CVE-2018-18700 is a vulnerability with a CVSS score of 5.5 (MEDIUM). An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption vulnerability resulting from infinite recursion in the functions d_name(), ...
How severe is CVE-2018-18700?
CVE-2018-18700 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-18700?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Binutils.