First published: Fri Oct 19 2018(Updated: )
A flaw was found in elfutils through v0.174. An Invalid Memory Address Dereference exists in the function elf_end in libelf. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file. References: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23787">https://sourceware.org/bugzilla/show_bug.cgi?id=23787</a> <a href="https://sourceware.org/ml/elfutils-devel/2018-q4/msg00057.html">https://sourceware.org/ml/elfutils-devel/2018-q4/msg00057.html</a> Upstream Patch: <a href="https://sourceware.org/git/?p=elfutils.git;a=commit;h=22d2d082d57a7470fadc0eae67179553f4919209">https://sourceware.org/git/?p=elfutils.git;a=commit;h=22d2d082d57a7470fadc0eae67179553f4919209</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/elfutils | 0.183-1 0.188-2.1 0.192-4 | |
CentOS Elfutils | <=0.174 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
SUSE Linux | =15.0 | |
SUSE Linux | =15.1 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18520 is classified as a medium severity vulnerability due to its potential impact on system stability.
To fix CVE-2018-18520, upgrade the elfutils package to version 0.183-1, 0.188-2.1, or 0.192-4 or later.
CVE-2018-18520 is an Invalid Memory Address Dereference vulnerability affecting the elf_end function in libelf.
CVE-2018-18520 affects various versions of the elfutils package on Debian, Ubuntu, and OpenSUSE.
Exploiting CVE-2018-18520 may lead to application crashes or unexpected behavior due to memory manipulation.