Description
The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-10208 | The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt. |
Ubuntu USN |
USN-4326-1 | libiberty vulnerabilities |
Ubuntu USN |
USN-4336-1 | GNU binutils vulnerabilities |
Ubuntu USN |
USN-4336-2 | GNU binutils vulnerabilities |
References
History
Fri, 14 Feb 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
threat_severity
|
threat_severity
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:08:21.950Z
Reserved: 2018-10-18T00:00:00.000Z
Link: CVE-2018-18483
No data.
Status : Modified
Published: 2018-10-18T21:29:02.800
Modified: 2024-11-21T03:56:00.980
Link: CVE-2018-18483
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN