First published: Mon May 15 2006(Updated: )
Buffer overflow in getsym in tekhex.c in libbfd in Free Software Foundation GNU Binutils before 20060423, as used by GNU strings, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a file with a crafted Tektronix Hex Format (TekHex) record in which the length character is not a valid hexadecimal character.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu/binutils | <2.17 | |
GNU Binutils | <2.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2362 has been classified as a medium severity vulnerability due to its potential for denial of service and arbitrary code execution.
To fix CVE-2006-2362, upgrade to a version of GNU Binutils later than 2.17.
CVE-2006-2362 affects GNU Binutils versions before 2.17.
CVE-2006-2362 enables context-dependent attackers to potentially cause a denial of service or execute arbitrary code.
The exploit method for CVE-2006-2362 involves crafting a file in the Tektronix Hex Format that triggers a buffer overflow.