First published: Sat Dec 31 2005(Updated: )
Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Binutils | <2.17 | |
Ubuntu | =5.04 | |
Ubuntu | =5.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4807 has a high severity rating due to its potential for arbitrary code execution.
To fix CVE-2005-4807, update your GNU Binutils to a version later than 2.17.
CVE-2005-4807 affects GNU Binutils before version 2.17 as well as Ubuntu Linux versions 5.04 and 5.10.
CVE-2005-4807 is a stack-based buffer overflow vulnerability.
Any attacker with the ability to provide a crafted .c file can exploit CVE-2005-4807.