First published: Mon Oct 01 2018(Updated: )
An issue was discovered in AdPlug 2.3.1. There are several double-free vulnerabilities in the CEmuopl class in emuopl.cpp because of a destructor's two OPLDestroy calls, each of which frees TL_TABLE, SIN_TABLE, AMS_TABLE, and VIB_TABLE.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AdPlug | =2.3.1 | |
Red Hat Fedora | =32 | |
Red Hat Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-17825 is classified as high due to potential remote code execution risks.
To fix CVE-2018-17825, upgrade AdPlug to version 2.3.2 or later where the vulnerability has been addressed.
CVE-2018-17825 affects AdPlug version 2.3.1 and specific versions of Fedora, including 32 and 33.
Yes, CVE-2018-17825 could be remotely exploited if an attacker can manipulate the input to the affected application.
Exploiting CVE-2018-17825 could lead to a denial-of-service condition or potentially allow an attacker to execute arbitrary code.