CVE Vulnerabilities

CVE-2018-5819

Uncontrolled Resource Consumption

Published: Feb 20, 2019 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
7.8 HIGH
AV:N/AC:L/Au:N/C:N/I:N/A:C
RedHat/V2
RedHat/V3
3.3 LOW
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

An error within the parse_sinar_ia() function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to exhaust available CPU resources.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
LibrawLibraw*0.19.1 (excluding)
Red Hat Ansible Tower 3.4 for RHEL 7RedHatansible-tower-34/ansible-tower-memcached:1.4.15-28*
Red Hat Ansible Tower 3.4 for RHEL 7RedHatansible-tower-35/ansible-tower-memcached:1.4.15-28*
Red Hat Ansible Tower 3.4 for RHEL 7RedHatansible-tower-37/ansible-tower-memcached-rhel7:1.4.15-28*
Red Hat Enterprise Linux 7RedHataccountsservice-0:0.6.50-5.el7*
Red Hat Enterprise Linux 7RedHatcairo-0:1.15.12-4.el7*
Red Hat Enterprise Linux 7RedHatdesktop-file-utils-0:0.23-2.el7*
Red Hat Enterprise Linux 7RedHatglib2-0:2.56.1-5.el7*
Red Hat Enterprise Linux 7RedHatgnome-boxes-0:3.28.5-4.el7*
Red Hat Enterprise Linux 7RedHatgnome-documents-0:3.28.2-2.el7*
Red Hat Enterprise Linux 7RedHatgnome-initial-setup-0:3.28.0-2.el7*
Red Hat Enterprise Linux 7RedHatgnome-session-0:3.28.1-7.el7*
Red Hat Enterprise Linux 7RedHatgnome-settings-daemon-0:3.28.1-4.el7*
Red Hat Enterprise Linux 7RedHatgnome-shell-0:3.28.3-11.el7*
Red Hat Enterprise Linux 7RedHatgnome-shell-extensions-0:3.28.1-7.el7*
Red Hat Enterprise Linux 7RedHatlibgnomekbd-0:3.26.0-3.el7*
Red Hat Enterprise Linux 7RedHatlibkdcraw-0:4.10.5-7.el7*
Red Hat Enterprise Linux 7RedHatLibRaw-0:0.19.2-1.el7*
Red Hat Enterprise Linux 7RedHatmutter-0:3.28.3-10.el7*
Red Hat Enterprise Linux 7RedHatnautilus-0:3.26.3.1-6.el7*
Red Hat Enterprise Linux 7RedHatpango-0:1.42.4-3.el7*
Red Hat Enterprise Linux 7RedHatpidgin-0:2.10.11-8.el7*
Red Hat Enterprise Linux 7RedHatplymouth-0:0.8.9-0.32.20140113.el7*
Red Hat Enterprise Linux 7RedHatshotwell-0:0.28.4-2.el7*
Red Hat Enterprise Linux 7RedHatxchat-1:2.8.8-24.el7*
DarktableUbuntubionic*
DarktableUbuntucosmic*
DarktableUbuntudisco*
DarktableUbuntueoan*
DarktableUbuntufocal*
DarktableUbuntugroovy*
DarktableUbuntuhirsute*
DarktableUbuntuimpish*
DarktableUbuntukinetic*
DarktableUbuntulunar*
DarktableUbuntumantic*
DarktableUbuntuoracular*
DarktableUbuntuplucky*
DarktableUbuntutrusty*
DarktableUbuntuxenial*
DcrawUbuntubionic*
DcrawUbuntucosmic*
DcrawUbuntudisco*
DcrawUbuntueoan*
DcrawUbuntufocal*
DcrawUbuntugroovy*
DcrawUbuntuhirsute*
DcrawUbuntuimpish*
DcrawUbuntukinetic*
DcrawUbuntulunar*
DcrawUbuntumantic*
DcrawUbuntuoracular*
DcrawUbuntuplucky*
DcrawUbuntutrusty*
DcrawUbuntuxenial*
ExactimageUbuntubionic*
ExactimageUbuntucosmic*
ExactimageUbuntudisco*
ExactimageUbuntueoan*
ExactimageUbuntufocal*
ExactimageUbuntugroovy*
ExactimageUbuntuhirsute*
ExactimageUbuntuimpish*
ExactimageUbuntukinetic*
ExactimageUbuntulunar*
ExactimageUbuntumantic*
ExactimageUbuntuoracular*
ExactimageUbuntuplucky*
ExactimageUbuntutrusty*
ExactimageUbuntuxenial*
KodiUbuntubionic*
KodiUbuntucosmic*
KodiUbuntudisco*
KodiUbuntueoan*
KodiUbuntufocal*
KodiUbuntugroovy*
KodiUbuntuhirsute*
KodiUbuntuimpish*
KodiUbuntukinetic*
KodiUbuntulunar*
KodiUbuntumantic*
KodiUbuntuoracular*
KodiUbuntuplucky*
KodiUbuntuxenial*
LibrawUbuntubionic*
LibrawUbuntucosmic*
LibrawUbuntuesm-infra/bionic*
LibrawUbuntuesm-infra/xenial*
LibrawUbuntutrusty*
LibrawUbuntuupstream*
LibrawUbuntuxenial*
RawtherapeeUbuntubionic*
RawtherapeeUbuntucosmic*
RawtherapeeUbuntudisco*
RawtherapeeUbuntueoan*
RawtherapeeUbuntufocal*
RawtherapeeUbuntugroovy*
RawtherapeeUbuntuhirsute*
RawtherapeeUbuntuimpish*
RawtherapeeUbuntukinetic*
RawtherapeeUbuntulunar*
RawtherapeeUbuntumantic*
RawtherapeeUbuntuoracular*
RawtherapeeUbuntuplucky*
RawtherapeeUbuntutrusty*
RawtherapeeUbuntuxenial*
UfrawUbuntubionic*
UfrawUbuntucosmic*
UfrawUbuntudisco*
UfrawUbuntutrusty*
UfrawUbuntuxenial*
XbmcUbuntutrusty*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References