CVE-2018-11375

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-11375
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-11375.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-11375
Downstream
Published
2018-05-22T19:29:00Z
Modified
2025-11-09T04:54:31.832686Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

The inst_lds() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file.

References

Affected packages

Git / github.com/radare/radare2

Affected ranges

Type
GIT
Repo
https://github.com/radare/radare2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected

Git / github.com/radareorg/radare2

Affected ranges

Type
GIT
Repo
https://github.com/radareorg/radare2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.10.0
0.10.1
0.10.2
0.10.3
0.10.4
0.10.4-termux4
0.10.5
0.10.6
0.8.6
0.8.8
0.9
0.9.2
0.9.4
0.9.6
0.9.7
0.9.8
0.9.8-rc1
0.9.8-rc2
0.9.8-rc3
0.9.8-rc4
0.9.9

1.*

1.0
1.0.0
1.0.1
1.0.2
1.1.0
1.2.0
1.2.0-git
1.3.0
1.3.0-git
1.4.0
1.5.0
1.6.0

2.*

2.0.0
2.0.1
2.1.0
2.2.0
2.4.0
2.5.0

Other

radare2-windows-nightly
termux

Database specific

vanir_signatures

[
    {
        "id": "CVE-2018-11375-4846e066",
        "digest": {
            "line_hashes": [
                "59949032631124415835154130221442270244",
                "250905909285801461283216386640223325087",
                "172584676077272419284248426208721834684",
                "144713666655975789411430724144284285313"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1",
        "target": {
            "file": "libr/anal/p/anal_avr.c"
        },
        "deprecated": false,
        "signature_type": "Line",
        "source": "https://github.com/radareorg/radare2/commit/041e53cab7ca33481ae45ecd65ad596976d78e68"
    },
    {
        "id": "CVE-2018-11375-be370b10",
        "digest": {
            "length": 237.0,
            "function_hash": "66945593404014828755856947936592576794"
        },
        "signature_version": "v1",
        "target": {
            "file": "libr/anal/p/anal_avr.c",
            "function": "INST_HANDLER"
        },
        "deprecated": false,
        "signature_type": "Function",
        "source": "https://github.com/radareorg/radare2/commit/041e53cab7ca33481ae45ecd65ad596976d78e68"
    }
]