CVE-2018-11376

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-11376
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-11376.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-11376
Downstream
Published
2018-05-22T19:29:00.270Z
Modified
2025-12-10T09:58:56.120514Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

The rreadle32() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted ELF file.

References

Affected packages

Git / github.com/radare/radare2

Affected ranges

Type
GIT
Repo
https://github.com/radare/radare2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-11376.json"

Git / github.com/radareorg/radare2

Affected ranges

Type
GIT
Repo
https://github.com/radareorg/radare2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.10.0
0.10.1
0.10.2
0.10.3
0.10.4
0.10.4-termux4
0.10.5
0.10.6
0.8.6
0.8.8
0.9
0.9.2
0.9.4
0.9.6
0.9.7
0.9.8
0.9.8-rc1
0.9.8-rc2
0.9.8-rc3
0.9.8-rc4
0.9.9

1.*

1.0
1.0.0
1.0.1
1.0.2
1.1.0
1.2.0
1.2.0-git
1.3.0
1.3.0-git
1.4.0
1.5.0
1.6.0

2.*

2.0.0
2.0.1
2.1.0
2.2.0
2.4.0
2.5.0

Other

radare2-windows-nightly
termux

Database specific

vanir_signatures

[
    {
        "signature_version": "v1",
        "signature_type": "Line",
        "id": "CVE-2018-11376-1236e4bf",
        "digest": {
            "line_hashes": [
                "74147868421164778536266043603420534155",
                "94012138497178765259711521921749933602",
                "127318990783415709744242895765158527360",
                "127253702788854721694552368469173099888"
            ],
            "threshold": 0.9
        },
        "source": "https://github.com/radareorg/radare2/commit/1f37c04f2a762500222dda2459e6a04646feeedf",
        "target": {
            "file": "libr/core/cbin.c"
        },
        "deprecated": false
    },
    {
        "signature_version": "v1",
        "signature_type": "Function",
        "id": "CVE-2018-11376-a48149a5",
        "digest": {
            "length": 3340.0,
            "function_hash": "268876414047930744123853343933127487284"
        },
        "source": "https://github.com/radareorg/radare2/commit/1f37c04f2a762500222dda2459e6a04646feeedf",
        "target": {
            "file": "libr/core/cbin.c",
            "function": "bin_entry"
        },
        "deprecated": false
    },
    {
        "signature_version": "v1",
        "signature_type": "Line",
        "id": "CVE-2018-11376-bf0ed46e",
        "digest": {
            "line_hashes": [
                "239465907582288234478493190199706323560",
                "265047590234715799993876434927710511677",
                "73638889202388708246382006019522487151",
                "203492581216947726462311589824830531931",
                "111223670578665787765158084771167683025",
                "310554751992119742824921622046783105906",
                "244373275692055250934245746795551528343",
                "144292358253911142672534763828864318582"
            ],
            "threshold": 0.9
        },
        "source": "https://github.com/radareorg/radare2/commit/1f37c04f2a762500222dda2459e6a04646feeedf",
        "target": {
            "file": "libr/bin/p/bin_elf.c"
        },
        "deprecated": false
    },
    {
        "signature_version": "v1",
        "signature_type": "Function",
        "id": "CVE-2018-11376-d254ef0b",
        "digest": {
            "length": 1117.0,
            "function_hash": "192691691577455363091545508820585713191"
        },
        "source": "https://github.com/radareorg/radare2/commit/1f37c04f2a762500222dda2459e6a04646feeedf",
        "target": {
            "file": "libr/bin/p/bin_elf.c",
            "function": "process_constructors"
        },
        "deprecated": false
    }
]

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-11376.json"