CVE-2018-18521

Source
https://cve.org/CVERecord?id=CVE-2018-18521
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-18521.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-18521
Downstream
Related
Published
2018-10-19T17:29:00.873Z
Modified
2026-02-04T09:23:15.877321Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Divide-by-zero vulnerabilities in the function arlibaddsymbols() in arlib.c in elfutils 0.174 allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled.

References

Affected packages

Git / sourceware.org/git/elfutils.git

Affected ranges

Type
GIT
Repo
https://sourceware.org/git/elfutils.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
52b6b2f1f49e7385527e9f311f248092be0c0b61

Affected versions

elfutils-0.*
elfutils-0.120
elfutils-0.121
elfutils-0.122
elfutils-0.123
elfutils-0.124
elfutils-0.125
elfutils-0.126
elfutils-0.127
elfutils-0.128
elfutils-0.129
elfutils-0.130
elfutils-0.131
elfutils-0.132
elfutils-0.133
elfutils-0.134
elfutils-0.135
elfutils-0.136
elfutils-0.137
elfutils-0.138
elfutils-0.139
elfutils-0.140
elfutils-0.141
elfutils-0.142
elfutils-0.143
elfutils-0.144
elfutils-0.145
elfutils-0.146
elfutils-0.147
elfutils-0.148
elfutils-0.149
elfutils-0.150
elfutils-0.151
elfutils-0.152
elfutils-0.153
elfutils-0.154
elfutils-0.155
elfutils-0.156
elfutils-0.157
elfutils-0.158
elfutils-0.159
elfutils-0.160
elfutils-0.161
elfutils-0.162
elfutils-0.163
elfutils-0.164
elfutils-0.165
elfutils-0.166
elfutils-0.167
elfutils-0.168
elfutils-0.169
elfutils-0.170
elfutils-0.171
elfutils-0.172
elfutils-0.173
elfutils-0.174

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-18521.json"