
CVE-2018-20431 – Ubuntu Security Notice USN-4641-1
https://notcve.org/view.php?id=CVE-2018-20431
24 Dec 2018 — GNU Libextractor through 1.8 has a NULL Pointer Dereference vulnerability in the function process_metadata() in plugins/ole2_extractor.c. GNU Libextractor, hasta la versión 1.8, tiene una desreferencia de puntero NULL en la función process_metadata() en plugins/ole2_extractor.c. It was discovered that Libextractor incorrectly handled zero sample rate. An attacker could possibly use this issue to cause a denial of service. It was discovered that Libextractor incorrectly handled certain FLAC metadata. • http://www.securityfocus.com/bid/106300 • CWE-476: NULL Pointer Dereference •

CVE-2018-20430 – Debian Security Advisory 4361-1
https://notcve.org/view.php?id=CVE-2018-20430
24 Dec 2018 — GNU Libextractor through 1.8 has an out-of-bounds read vulnerability in the function history_extract() in plugins/ole2_extractor.c, related to EXTRACTOR_common_convert_to_utf8 in common/convert.c. GNU Libextractor, hasta la versión 1.8, tiene una vulnerabilidad de lectura fuera de límites en la función history_extract() en plugins/ole2_extractor.c, relacionada con EXTRACTOR_common_convert_to_utf8 en common/convert.c. Several vulnerabilities were discovered in libextractor, a library to extract arbitrary met... • http://www.securityfocus.com/bid/106300 • CWE-125: Out-of-bounds Read •

CVE-2018-1000876 – binutils: integer overflow leads to heap-based buffer overflow in objdump
https://notcve.org/view.php?id=CVE-2018-1000876
20 Dec 2018 — binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f. binutils, en versiones 2.32 y anteriores, contiene una vulnerabilidad de desbordamiento... • http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html • CWE-122: Heap-based Buffer Overflow CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVE-2018-20230
https://notcve.org/view.php?id=CVE-2018-20230
19 Dec 2018 — An issue was discovered in PSPP 1.2.0. There is a heap-based buffer overflow at the function read_bytes_internal in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact. Se ha descubierto un problema en PSPP 1.2.0. Hay un desbordamiento de búfer basado en pila en la función read_bytes_internal en utilities/pspp-dump-sav.c que permite que atacantes remotos provoquen una denegación de servicio (cierre inesperado de la apli... • https://bugzilla.redhat.com/show_bug.cgi?id=1660318 • CWE-787: Out-of-bounds Write •

CVE-2018-20002 – Ubuntu Security Notice USN-4336-2
https://notcve.org/view.php?id=CVE-2018-20002
10 Dec 2018 — The _bfd_generic_read_minisymbols function in syms.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, has a memory leak via a crafted ELF file, leading to a denial of service (memory consumption), as demonstrated by nm. La función _bfd_generic_read_minisymbols en syms.c en la biblioteca Binary File Descriptor (BFD), también conocida como libbfd, tal y como se distribuye en GNU Binutils 2.31, tiene una fuga de memoria mediante un archivo ELF manipulado, que condu... • http://www.securityfocus.com/bid/106142 • CWE-772: Missing Release of Resource after Effective Lifetime •

CVE-2018-19931 – Ubuntu Security Notice USN-4336-2
https://notcve.org/view.php?id=CVE-2018-19931
07 Dec 2018 — An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted. Se ha descubierto un problema en la biblioteca Binary File Descriptor (BFD), también conocida como libbfd, tal y como se distribuye en GNU Binutils 2.31. Hay un desbordamiento de búfer basado en memoria dinámica (heap) en bfd_elf32_swap_phdr_in en elf... • http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html • CWE-787: Out-of-bounds Write •

CVE-2018-19932 – Ubuntu Security Notice USN-4336-2
https://notcve.org/view.php?id=CVE-2018-19932
07 Dec 2018 — An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c. Se ha descubierto un problema en la biblioteca Binary File Descriptor (BFD), también conocida como libbfd, tal y como se distribuye en GNU Binutils hasta la versión 2.31. Hay un desbordamiento de enteros y un bucle infinito provocados por la macro IS_CONTAINED_BY_LMA en elf.c. USN-4336-1... • http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html • CWE-190: Integer Overflow or Wraparound •

CVE-2018-19591 – Gentoo Linux Security Advisory 201908-06
https://notcve.org/view.php?id=CVE-2018-19591
04 Dec 2018 — In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function. En la biblioteca GNU C (también conocida como glibc o libc6) hasta la versión 2.28, los intentos para resolver un nombre de host manipulado mediante getaddrinfo() conducen a la asignación de un descriptor de un socket que no está cerrado. Esto está relacionado con la función if_n... • http://www.securityfocus.com/bid/106037 • CWE-20: Improper Input Validation •

CVE-2018-16868 – Slackware Security Advisory - gnutls Updates
https://notcve.org/view.php?id=CVE-2018-16868
03 Dec 2018 — A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server. Se ha detectado un ataque de oráculo de relleno basado en canales laterales de tipo Bleichenbacher en la manera en la que gnutls maneja la verificación de los datos PKCS#... • http://cat.eyalro.net • CWE-203: Observable Discrepancy •

CVE-2018-19211 – Ubuntu Security Notice USN-5477-1
https://notcve.org/view.php?id=CVE-2018-19211
12 Nov 2018 — In ncurses 6.1, there is a NULL pointer dereference at function _nc_parse_entry in parse_entry.c that will lead to a denial of service attack. The product proceeds to the dereference code path even after a "dubious character `*' in name or alias field" detection. En ncurses versión 6.1, hay una desreferencia de puntero NULL en la función _nc_parse_entry del archivo parse_entry.c que conducirá a un ataque de denegación de servicio (DoS). El producto procede al path del código de desreferencia incluso después... • https://bugzilla.redhat.com/show_bug.cgi?id=1643754 • CWE-476: NULL Pointer Dereference •