### [CVE-2018-18483](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt. ### POC #### Reference - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602 - https://sourceware.org/bugzilla/show_bug.cgi?id=23767 #### Github - https://github.com/fokypoky/places-list - https://github.com/fuzz-evaluator/MemLock-Fuzz-eval - https://github.com/testing-felickz/docker-scout-demo - https://github.com/wcventure/MemLock-Fuzz