First published: Sat Oct 27 2018(Updated: )
An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption vulnerability resulting from infinite recursion in the functions d_name(), d_encoding(), and d_local_name() in cp-demangle.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via an ELF file, as demonstrated by nm.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.31 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-18700.
The affected software includes GNU Binutils versions 2.31 and older.
The severity of CVE-2018-18700 is not specified in the provided information.
You can fix the vulnerability in GNU Binutils by updating to a version newer than 2.31.
Yes, you can find more information about this vulnerability at the following references: [https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681](https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681), [https://usn.ubuntu.com/4326-1/](https://usn.ubuntu.com/4326-1/), [https://usn.ubuntu.com/4336-1/](https://usn.ubuntu.com/4336-1/)