{"id":"CVE-2018-14016","details":"The r_bin_mdmp_init_directory_entry function in mdmp.c in radare2 2.7.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted Mini Crash Dump file.","modified":"2026-04-11T12:27:26.069685Z","published":"2018-07-12T20:29:00.227Z","references":[{"type":"FIX","url":"https://github.com/radareorg/radare2/commit/eb7deb281df54771fb8ecf5890dc325a7d22d3e2"},{"type":"EVIDENCE","url":"https://github.com/radare/radare2/issues/10464"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/radare/radare2","events":[{"introduced":"0"},{"last_affected":"6e08e452a7ec231a73997c44b4ff556c2998c7d9"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.7.0"}]}},{"type":"GIT","repo":"https://github.com/radareorg/radare2","events":[{"introduced":"0"},{"fixed":"eb7deb281df54771fb8ecf5890dc325a7d22d3e2"}]}],"versions":["0.10.0","0.10.1","0.10.2","0.10.3","0.10.4","0.10.4-termux4","0.10.5","0.10.6","0.8.6","0.8.8","0.9","0.9.2","0.9.4","0.9.6","0.9.7","0.9.8","0.9.8-rc1","0.9.8-rc2","0.9.8-rc3","0.9.8-rc4","0.9.9","1.0","1.0.0","1.0.1","1.0.2","1.1.0","1.2.0","1.2.0-git","1.3.0","1.3.0-git","1.4.0","1.5.0","1.6.0","2.0.0","2.0.1","2.1.0","2.2.0","2.4.0","2.5.0","2.6.0","2.6.9","2.7.0","radare2-windows-nightly","termux"],"database_specific":{"vanir_signatures":[{"deprecated":false,"source":"https://github.com/radareorg/radare2/commit/eb7deb281df54771fb8ecf5890dc325a7d22d3e2","signature_type":"Line","id":"CVE-2018-14016-248d4a6c","target":{"file":"libr/bin/format/mdmp/mdmp.c"},"signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["231245728831905222921630915517020447311","70462949573779659726965858667787134888","316041451851517453610972412874365208476","264607919964460955081543941688388616685","309402496660179540303476061535278416151","282782220847829564334063846700709508954","206605873927010035432978506919036679103","485646185572423293497001910319109458","36108082595184941937583508015929792657","283211589649152713679052184031322531424","204520672791558034194382167091315669923","311599214643113986860321629278894842360","245033373197533747048034146955711637800","63553669983174285652154333237457904779","178346162769830567962157833645418877521","38250690214496304598030233344023414897"]}},{"deprecated":false,"source":"https://github.com/radareorg/radare2/commit/eb7deb281df54771fb8ecf5890dc325a7d22d3e2","signature_type":"Function","id":"CVE-2018-14016-822cc878","target":{"function":"r_bin_mdmp_init_directory","file":"libr/bin/format/mdmp/mdmp.c"},"signature_version":"v1","digest":{"function_hash":"340205444792855952209826197946841515014","length":566}}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-14016.json","vanir_signatures_modified":"2026-04-11T12:27:26Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}