{"id":"CVE-2018-5816","details":"An integer overflow error within the \"identify()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger a division by zero via specially crafted NOKIARAW file (Note: This vulnerability is caused due to an incomplete fix of CVE-2018-5804).","modified":"2026-03-20T11:26:54.935636Z","published":"2018-12-07T22:29:01.723Z","related":["MGASA-2018-0356","SUSE-SU-2019:0005-1","openSUSE-SU-2019:0008-1"],"references":[{"type":"ADVISORY","url":"https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt"},{"type":"ADVISORY","url":"https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3838-1/"},{"type":"REPORT","url":"https://secuniaresearch.flexerasoftware.com/advisories/83507/"},{"type":"FIX","url":"https://github.com/LibRaw/LibRaw/commit/1d8d1b452e5dc74033ee9f846081a0efb616cc39"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libraw/libraw","events":[{"introduced":"0"},{"fixed":"6c62f2b45c290c25371492bbd7bae431b3cddd48"},{"fixed":"1d8d1b452e5dc74033ee9f846081a0efb616cc39"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.18.12"}]}}],"versions":["0.11.0-Release","0.11.1","0.11.2","0.12.0","0.12.1","0.13.0","0.13.1","0.13.2","0.13.3","0.13.4","0.13.5","0.13.6","0.13.7","0.13.8","0.14.0","0.14.1","0.14.2","0.14.3","0.14.4","0.14.5","0.14.6","0.15.0","0.16.0","0.17.0","0.18.0","0.18.1","0.18.10","0.18.11","0.18.2","0.18.3","0.18.4","0.18.5","0.18.6","0.18.7","0.18.8","0.18.9"],"database_specific":{"vanir_signatures":[{"signature_type":"Line","deprecated":false,"id":"CVE-2018-5816-13e2e5a8","target":{"file":"internal/dcraw_common.cpp"},"source":"https://github.com/libraw/libraw/commit/1d8d1b452e5dc74033ee9f846081a0efb616cc39","signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["149115307467341041946650920507335754192","249788294694743818553041987795189000353","264130181463166165130195137198822619265","146931122158647408271548350055420031602"]}},{"signature_type":"Line","deprecated":false,"id":"CVE-2018-5816-314ae728","target":{"file":"dcraw/dcraw.c"},"source":"https://github.com/libraw/libraw/commit/1d8d1b452e5dc74033ee9f846081a0efb616cc39","signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["149115307467341041946650920507335754192","249788294694743818553041987795189000353","264130181463166165130195137198822619265","146931122158647408271548350055420031602"]}},{"signature_type":"Function","deprecated":false,"id":"CVE-2018-5816-44d9dffa","target":{"file":"internal/dcraw_common.cpp","function":"identify"},"source":"https://github.com/libraw/libraw/commit/1d8d1b452e5dc74033ee9f846081a0efb616cc39","signature_version":"v1","digest":{"function_hash":"146558577448886377438406580047394554080","length":61590}},{"signature_type":"Function","deprecated":false,"id":"CVE-2018-5816-a0d39601","target":{"file":"dcraw/dcraw.c","function":"identify"},"source":"https://github.com/libraw/libraw/commit/1d8d1b452e5dc74033ee9f846081a0efb616cc39","signature_version":"v1","digest":{"function_hash":"146558577448886377438406580047394554080","length":61590}}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-5816.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}