First published: Fri Oct 19 2018(Updated: )
A flaw was found in elfutils 0.174. A Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled. References: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23786">https://sourceware.org/bugzilla/show_bug.cgi?id=23786</a> <a href="https://sourceware.org/ml/elfutils-devel/2018-q4/msg00055.html">https://sourceware.org/ml/elfutils-devel/2018-q4/msg00055.html</a> Upstream Patch: <a href="https://sourceware.org/git/?p=elfutils.git;a=commit;h=2b16a9be69939822dcafe075413468daac98b327">https://sourceware.org/git/?p=elfutils.git;a=commit;h=2b16a9be69939822dcafe075413468daac98b327</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/elfutils | 0.183-1 0.188-2.1 0.192-4 | |
CentOS Elfutils | =0.174 | |
Debian | =8.0 | |
Debian | =9.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
SUSE Linux | =15.0 | |
SUSE Linux | =15.1 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18521 is classified as a denial of service vulnerability that can cause an application crash.
To fix CVE-2018-18521, upgrade elfutils to version 0.183-1 or later.
CVE-2018-18521 affects elfutils version 0.174 and earlier.
Yes, CVE-2018-18521 can be exploited remotely using a crafted ELF file.
The function arlib_add_symbols() in arlib.c is where the divide-by-zero vulnerability occurs.