Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c in elfutils 0.174 allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled.
                
            References
                    | Link | Resource | 
|---|---|
| http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html | Mailing List Third Party Advisory | 
| https://access.redhat.com/errata/RHSA-2019:2197 | Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html | Mailing List Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html | Mailing List Third Party Advisory | 
| https://sourceware.org/bugzilla/show_bug.cgi?id=23786 | Exploit Issue Tracking Third Party Advisory | 
| https://sourceware.org/ml/elfutils-devel/2018-q4/msg00055.html | Mailing List Patch Third Party Advisory | 
| https://usn.ubuntu.com/4012-1/ | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
Configuration 2 (hide)
            
            
  | 
    
Configuration 3 (hide)
            
            
  | 
    
Configuration 4 (hide)
            
            
  | 
    
Configuration 5 (hide)
            
            
  | 
    
History
                    No history.
Information
                Published : 2018-10-19 17:29
Updated : 2021-11-30 21:59
NVD link : CVE-2018-18521
Mitre link : CVE-2018-18521
CVE.ORG link : CVE-2018-18521
JSON object : View
Products Affected
                redhat
- enterprise_linux_server
 - enterprise_linux_desktop
 - enterprise_linux_workstation
 
canonical
- ubuntu_linux
 
opensuse
- leap
 
elfutils_project
- elfutils
 
debian
- debian_linux
 
CWE
                
                    
                        
                        CWE-369
                        
            Divide By Zero
