Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-7148

Опубликовано: 29 янв. 2019
Источник: ubuntu
Приоритет: negligible
EPSS Низкий
CVSS2: 4.3
CVSS3: 6.5

Описание

An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens."

РелизСтатусПримечание
bionic

ignored

cosmic

ignored

devel

not-affected

0.176-1.1
disco

not-affected

0.176-1
esm-infra-legacy/trusty

ignored

esm-infra/bionic

ignored

esm-infra/xenial

ignored

precise/esm

ignored

trusty

ignored

end of standard support
trusty/esm

ignored

Показывать по

Ссылки на источники

EPSS

Процентиль: 75%
0.00886
Низкий

4.3 Medium

CVSS2

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 3.3
redhat
около 7 лет назад

An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens."

CVSS3: 6.5
nvd
около 7 лет назад

An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens."

CVSS3: 6.5
debian
около 7 лет назад

An attempted excessive memory allocation was discovered in the functio ...

CVSS3: 6.5
github
больше 3 лет назад

An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens."

CVSS3: 6.5
fstec
около 7 лет назад

Уязвимость функции read_long_names() утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 75%
0.00886
Низкий

4.3 Medium

CVSS2

6.5 Medium

CVSS3