{"id":"CVE-2018-19837","details":"In LibSass prior to 3.5.5, Sass::Eval::operator()(Sass::Binary_Expression*) inside eval.cpp allows attackers to cause a denial-of-service resulting from stack consumption via a crafted sass file, because of certain incorrect parsing of '%' as a modulo operator in parser.cpp.","modified":"2026-04-16T00:08:15.835710044Z","published":"2018-12-04T09:29:00.320Z","related":["openSUSE-SU-2019:1791-1","openSUSE-SU-2019:1800-1","openSUSE-SU-2019:1883-1","openSUSE-SU-2024:10988-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00051.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00027.html"},{"type":"FIX","url":"https://github.com/sass/libsass/issues/2659"},{"type":"EVIDENCE","url":"https://github.com/sass/libsass/commit/210fdff7a65370c2ae24e022a2b35da8c423cc5f"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/sass/libsass","events":[{"introduced":"0"},{"fixed":"39e30874b9a5dd6a802c20e8b0470ba44eeba929"},{"fixed":"210fdff7a65370c2ae24e022a2b35da8c423cc5f"}],"database_specific":{"source":["CPE_FIELD","REFERENCES"],"extracted_events":[{"introduced":"0"},{"fixed":"3.5.5"}],"cpe":"cpe:2.3:a:sass-lang:libsass:*:*:*:*:*:*:*:*"}}],"versions":["2.1.0-beta","3.0","3.0.1","3.0.2","3.0rc1","3.0rc2","3.0rc4","3.1-alpha","3.1-alpha2","3.1.0","3.1.0-beta","3.1.0-beta.2","3.2.0","3.2.0-beta.1","3.2.0-beta.2","3.2.0-beta.3","3.2.0-beta.4","3.2.0-beta.5","3.2.0-beta.6","3.2.1","3.2.2","3.2.3","3.2.4","3.2.5","3.3.0","3.3.0-beta1","3.3.0-beta2","3.3.0-beta3","3.3.1","3.3.2","3.3.3","3.3.4","3.3.5","3.3.6","3.4.0","3.4.0-RC1","3.4.2","3.5.0","3.5.0.beta.1","3.5.0.beta.2","3.5.0.beta.3","3.5.1","3.5.2","3.5.3","3.5.4","RELEASE-1.0","v2.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-19837.json","vanir_signatures":[{"source":"https://github.com/sass/libsass/commit/210fdff7a65370c2ae24e022a2b35da8c423cc5f","id":"CVE-2018-19837-ae1917b7","target":{"function":"Parser::parse_value","file":"src/parser.cpp"},"signature_version":"v1","deprecated":false,"signature_type":"Function","digest":{"function_hash":"165885596483511393063274280585420607993","length":2498}},{"source":"https://github.com/sass/libsass/commit/210fdff7a65370c2ae24e022a2b35da8c423cc5f","id":"CVE-2018-19837-c71612b0","signature_type":"Line","signature_version":"v1","deprecated":false,"target":{"file":"src/parser.cpp"},"digest":{"line_hashes":["158550758329213429823339009714291952923","248729470278415984234477818821013894605","66451365466247137398889437797457684636","311322115924971552268989963752639181995","7945816132210125360185350847370858332"],"threshold":0.9}}],"vanir_signatures_modified":"2026-04-11T18:21:01Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}