The inst_sts() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file.
[
{
"signature_type": "Function",
"digest": {
"function_hash": "36772784642327968695647459631776514589",
"length": 254.0
},
"deprecated": false,
"signature_version": "v1",
"source": "https://github.com/radareorg/radare2/commit/d04c78773f6959bcb427453f8e5b9824d5ba9eff",
"target": {
"function": "INST_HANDLER",
"file": "libr/anal/p/anal_avr.c"
},
"id": "CVE-2018-11382-2b0d0518"
},
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"285858488444946652490175909854296657273",
"108856749833030005539391680303993597604",
"179596596573524497750901142906993065828",
"12220346535136369315153892899161841978"
],
"threshold": 0.9
},
"deprecated": false,
"signature_version": "v1",
"source": "https://github.com/radareorg/radare2/commit/d04c78773f6959bcb427453f8e5b9824d5ba9eff",
"target": {
"file": "libr/anal/p/anal_avr.c"
},
"id": "CVE-2018-11382-4fc63064"
}
]