CVE Vulnerabilities

CVE-2018-5819

Uncontrolled Resource Consumption

Published: Feb 20, 2019 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
7.8 HIGH
AV:N/AC:L/Au:N/C:N/I:N/A:C
RedHat/V2
RedHat/V3
3.3 LOW
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Ubuntu
LOW

An error within the parse_sinar_ia() function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to exhaust available CPU resources.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

Name Vendor Start Version End Version
Libraw Libraw * 0.19.1 (excluding)
Red Hat Ansible Tower 3.4 for RHEL 7 RedHat ansible-tower-34/ansible-tower-memcached:1.4.15-28 *
Red Hat Ansible Tower 3.4 for RHEL 7 RedHat ansible-tower-35/ansible-tower-memcached:1.4.15-28 *
Red Hat Ansible Tower 3.4 for RHEL 7 RedHat ansible-tower-37/ansible-tower-memcached-rhel7:1.4.15-28 *
Red Hat Enterprise Linux 7 RedHat accountsservice-0:0.6.50-5.el7 *
Red Hat Enterprise Linux 7 RedHat cairo-0:1.15.12-4.el7 *
Red Hat Enterprise Linux 7 RedHat desktop-file-utils-0:0.23-2.el7 *
Red Hat Enterprise Linux 7 RedHat glib2-0:2.56.1-5.el7 *
Red Hat Enterprise Linux 7 RedHat gnome-boxes-0:3.28.5-4.el7 *
Red Hat Enterprise Linux 7 RedHat gnome-documents-0:3.28.2-2.el7 *
Red Hat Enterprise Linux 7 RedHat gnome-initial-setup-0:3.28.0-2.el7 *
Red Hat Enterprise Linux 7 RedHat gnome-session-0:3.28.1-7.el7 *
Red Hat Enterprise Linux 7 RedHat gnome-settings-daemon-0:3.28.1-4.el7 *
Red Hat Enterprise Linux 7 RedHat gnome-shell-0:3.28.3-11.el7 *
Red Hat Enterprise Linux 7 RedHat gnome-shell-extensions-0:3.28.1-7.el7 *
Red Hat Enterprise Linux 7 RedHat libgnomekbd-0:3.26.0-3.el7 *
Red Hat Enterprise Linux 7 RedHat libkdcraw-0:4.10.5-7.el7 *
Red Hat Enterprise Linux 7 RedHat LibRaw-0:0.19.2-1.el7 *
Red Hat Enterprise Linux 7 RedHat mutter-0:3.28.3-10.el7 *
Red Hat Enterprise Linux 7 RedHat nautilus-0:3.26.3.1-6.el7 *
Red Hat Enterprise Linux 7 RedHat pango-0:1.42.4-3.el7 *
Red Hat Enterprise Linux 7 RedHat pidgin-0:2.10.11-8.el7 *
Red Hat Enterprise Linux 7 RedHat plymouth-0:0.8.9-0.32.20140113.el7 *
Red Hat Enterprise Linux 7 RedHat shotwell-0:0.28.4-2.el7 *
Red Hat Enterprise Linux 7 RedHat xchat-1:2.8.8-24.el7 *
Darktable Ubuntu bionic *
Darktable Ubuntu cosmic *
Darktable Ubuntu disco *
Darktable Ubuntu eoan *
Darktable Ubuntu focal *
Darktable Ubuntu groovy *
Darktable Ubuntu hirsute *
Darktable Ubuntu impish *
Darktable Ubuntu kinetic *
Darktable Ubuntu lunar *
Darktable Ubuntu mantic *
Darktable Ubuntu oracular *
Darktable Ubuntu trusty *
Darktable Ubuntu xenial *
Dcraw Ubuntu bionic *
Dcraw Ubuntu cosmic *
Dcraw Ubuntu disco *
Dcraw Ubuntu eoan *
Dcraw Ubuntu focal *
Dcraw Ubuntu groovy *
Dcraw Ubuntu hirsute *
Dcraw Ubuntu impish *
Dcraw Ubuntu kinetic *
Dcraw Ubuntu lunar *
Dcraw Ubuntu mantic *
Dcraw Ubuntu oracular *
Dcraw Ubuntu trusty *
Dcraw Ubuntu xenial *
Exactimage Ubuntu bionic *
Exactimage Ubuntu cosmic *
Exactimage Ubuntu disco *
Exactimage Ubuntu eoan *
Exactimage Ubuntu focal *
Exactimage Ubuntu groovy *
Exactimage Ubuntu hirsute *
Exactimage Ubuntu impish *
Exactimage Ubuntu kinetic *
Exactimage Ubuntu lunar *
Exactimage Ubuntu mantic *
Exactimage Ubuntu oracular *
Exactimage Ubuntu trusty *
Exactimage Ubuntu xenial *
Kodi Ubuntu bionic *
Kodi Ubuntu cosmic *
Kodi Ubuntu disco *
Kodi Ubuntu eoan *
Kodi Ubuntu focal *
Kodi Ubuntu groovy *
Kodi Ubuntu hirsute *
Kodi Ubuntu impish *
Kodi Ubuntu kinetic *
Kodi Ubuntu lunar *
Kodi Ubuntu mantic *
Kodi Ubuntu oracular *
Kodi Ubuntu xenial *
Libraw Ubuntu bionic *
Libraw Ubuntu cosmic *
Libraw Ubuntu esm-infra/bionic *
Libraw Ubuntu esm-infra/xenial *
Libraw Ubuntu trusty *
Libraw Ubuntu upstream *
Libraw Ubuntu xenial *
Rawtherapee Ubuntu bionic *
Rawtherapee Ubuntu cosmic *
Rawtherapee Ubuntu disco *
Rawtherapee Ubuntu eoan *
Rawtherapee Ubuntu focal *
Rawtherapee Ubuntu groovy *
Rawtherapee Ubuntu hirsute *
Rawtherapee Ubuntu impish *
Rawtherapee Ubuntu kinetic *
Rawtherapee Ubuntu lunar *
Rawtherapee Ubuntu mantic *
Rawtherapee Ubuntu oracular *
Rawtherapee Ubuntu trusty *
Rawtherapee Ubuntu xenial *
Ufraw Ubuntu bionic *
Ufraw Ubuntu cosmic *
Ufraw Ubuntu disco *
Ufraw Ubuntu trusty *
Ufraw Ubuntu xenial *
Xbmc Ubuntu trusty *

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References