CVE Vulnerabilities

CVE-2018-9138

Uncontrolled Recursion

Published: Mar 30, 2018 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
3.3 LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.29 and 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_nested_args, demangle_args, do_arg, and do_type.

Weakness

The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.

Affected Software

NameVendorStart VersionEnd Version
BinutilsGnu2.29 (including)2.29 (including)
BinutilsGnu2.30 (including)2.30 (including)
BinutilsUbuntuartful*
BinutilsUbuntubionic*
BinutilsUbuntucosmic*
BinutilsUbuntuesm-infra-legacy/trusty*
BinutilsUbuntuesm-infra/bionic*
BinutilsUbuntuesm-infra/xenial*
BinutilsUbuntuprecise/esm*
BinutilsUbuntutrusty*
BinutilsUbuntutrusty/esm*
BinutilsUbuntuupstream*
BinutilsUbuntuxenial*
LibibertyUbuntuartful*
LibibertyUbuntubionic*
LibibertyUbuntucosmic*
LibibertyUbuntudisco*
LibibertyUbuntuesm-infra/bionic*
LibibertyUbuntuesm-infra/xenial*
LibibertyUbuntutrusty*
LibibertyUbuntuupstream*
LibibertyUbuntuxenial*

Potential Mitigations

References