Bug 1645957 (CVE-2018-18483) - CVE-2018-18483 binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service
Summary: CVE-2018-18483 binutils: Integer overflow in cplus-dem.c:get_count() allows f...
Keywords:
Status: NEW
Alias: CVE-2018-18483
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1645961 1645963 1645965 1645966 1650333 1653849 1654027
Blocks: 1647427
TreeView+ depends on / blocked
 
Reported: 2018-11-05 05:14 UTC by Sam Fowler
Modified: 2019-09-29 15:01 UTC (History)
21 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)

Description Sam Fowler 2018-11-05 05:14:31 UTC
The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.


Upstream Bugs:

https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767

Comment 1 Sam Fowler 2018-11-05 05:20:28 UTC
Created binutils tracking bugs for this issue:

Affects: fedora-all [bug 1645961]


Created mingw-binutils tracking bugs for this issue:

Affects: epel-all [bug 1645963]

Comment 4 Scott Gayou 2018-11-15 21:19:50 UTC
Trivial to reproduce, binutils220 does not package c++filt.


Note You need to log in before you can comment on or make changes to this bug.