Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-7148

Опубликовано: 11 янв. 2019
Источник: redhat
CVSS3: 3.3
EPSS Низкий

Описание

An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens."

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5elfutilsNot affected
Red Hat Enterprise Linux 6elfutilsNot affected
Red Hat Enterprise Linux 7elfutilsNot affected
Red Hat Enterprise Linux 8elfutilsNot affected

Показывать по

Дополнительная информация

Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1671439elfutils: excessive memory allocation in read_long_names in elf_begin.c in libelf

EPSS

Процентиль: 75%
0.00886
Низкий

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 7 лет назад

An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens."

CVSS3: 6.5
nvd
около 7 лет назад

An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens."

CVSS3: 6.5
debian
около 7 лет назад

An attempted excessive memory allocation was discovered in the functio ...

CVSS3: 6.5
github
больше 3 лет назад

An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens."

CVSS3: 6.5
fstec
около 7 лет назад

Уязвимость функции read_long_names() утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 75%
0.00886
Низкий

3.3 Low

CVSS3