The avropanalyze() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file.
[
{
"signature_version": "v1",
"source": "https://github.com/radareorg/radare2/commit/b35530fa0681b27eba084de5527037ebfb397422",
"deprecated": false,
"id": "CVE-2018-11377-8348f764",
"target": {
"function": "avr_op_analyze",
"file": "libr/anal/p/anal_avr.c"
},
"digest": {
"length": 1483.0,
"function_hash": "327063140249559742380314833170461386858"
},
"signature_type": "Function"
},
{
"signature_version": "v1",
"source": "https://github.com/radareorg/radare2/commit/b35530fa0681b27eba084de5527037ebfb397422",
"deprecated": false,
"id": "CVE-2018-11377-a6154e28",
"target": {
"file": "libr/anal/p/anal_avr.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"144132823001693225856868479811057079833",
"219857305555831906814452102661518906430",
"282146316362990154555179307945927082167",
"103185815944192371352904682523499123661"
]
},
"signature_type": "Line"
}
]