First published: Mon Sep 03 2018(Updated: )
Elfutils through version 0.173 is vulnerable to a heap-based buffer over-read due to incorrect checks for the end of attribute lists in the libdw/dwarf_getabbrev.c:__libdw_getabbrev() and libdw/dwarf_hasattr.c:dwarf_hasattr() functions. An attacker could exploit this to cause a crash via a crafted ELF. Upstream Bug: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23529">https://sourceware.org/bugzilla/show_bug.cgi?id=23529</a> Upstream Patch: <a href="https://sourceware.org/git/?p=elfutils.git;a=patch;h=6983e59b727458a6c64d9659c85f08218bc4fcda">https://sourceware.org/git/?p=elfutils.git;a=patch;h=6983e59b727458a6c64d9659c85f08218bc4fcda</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/elfutils | 0.183-1 0.188-2.1 0.192-4 | |
CentOS Elfutils | =0.173 |
https://sourceware.org/git/?p=elfutils.git;a=commit;h=6983e59b727458a6c64d9659c85f08218bc4fcda
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16403 is rated as a medium severity vulnerability due to its potential to cause application crashes.
To fix CVE-2018-16403, upgrade to a patched version of elfutils, specifically version 0.183-1 or later.
CVE-2018-16403 can be exploited by attackers through crafted ELF files to trigger heap-based buffer over-reads.
CVE-2018-16403 affects elfutils versions up to and including 0.173.
More detailed information about CVE-2018-16403 can typically be found in security bulletins relevant to the affected distributions.