CVE-2018-12698
Ubuntu Security Notice USN-4336-2
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
-Decision
Descriptions
demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump.
demangle_template en cplus-dem.c en GNU libiberty, tal y como se distribuye en GNU Binutils 2.30, permite que los atacantes desencadenen un consumo de memoria excesivo (tambiĆ©n conocido como OOM) durante la llamada XNEWVEC "Create an array for saving the template argument values" ("Cree un array para guardar los valores de argumentos de plantilla"). Esto puede ocurrir durante la ejecuciĆ³n de objdump.
USN-4336-1 fixed several vulnerabilities in GNU binutils. This update provides the corresponding update for Ubuntu 16.04 ESM. It was discovered that GNU binutils contained a large number of security issues. If a user or automated system were tricked into processing a specially-crafted file, a remote attacker could cause GNU binutils to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-06-23 CVE Reserved
- 2018-06-23 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2025-04-08 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/104539 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102 | 2024-08-05 | |
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454 | 2024-08-05 | |
https://sourceware.org/bugzilla/show_bug.cgi?id=23057 | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/201908-01 | 2019-10-03 | |
https://usn.ubuntu.com/4326-1 | 2019-10-03 | |
https://usn.ubuntu.com/4336-1 | 2019-10-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gnu Search vendor "Gnu" | Binutils Search vendor "Gnu" for product "Binutils" | 2.30 Search vendor "Gnu" for product "Binutils" and version "2.30" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04.4 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04.4" | - |
Affected
|