CVE-2018-12697
binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c.
Severity Score
7.5
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
3
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
Se ha descubierto una desreferencia de puntero NULL (también conocida como SEGV o dirección desconocida 0x000000000000) en work_stuff_copy_to_from en cplus-dem.c en GNU libiberty, tal y como se distribuye en aGNU Binutils 2.30. Esto puede ocurrir durante la ejecución de objdump.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2018-06-23 CVE Reserved
- 2018-06-23 CVE Published
- 2024-06-02 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/104538 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102 | 2024-08-05 | |
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454 | 2024-08-05 | |
https://sourceware.org/bugzilla/show_bug.cgi?id=23057 | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2019:2075 | 2019-08-03 | |
https://security.gentoo.org/glsa/201908-01 | 2019-08-03 | |
https://usn.ubuntu.com/4326-1 | 2019-08-03 | |
https://usn.ubuntu.com/4336-1 | 2019-08-03 | |
https://access.redhat.com/security/cve/CVE-2018-12697 | 2019-08-06 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1595417 | 2019-08-06 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gnu Search vendor "Gnu" | Binutils Search vendor "Gnu" for product "Binutils" | 2.30 Search vendor "Gnu" for product "Binutils" and version "2.30" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04.4 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04.4" | - |
Affected
|