First published: Wed Apr 09 2014(Updated: )
Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Elfutils Project Elfutils | =0.153 | |
Elfutils Project Elfutils | =0.154 | |
Elfutils Project Elfutils | =0.155 | |
Elfutils Project Elfutils | =0.156 | |
Elfutils Project Elfutils | =0.157 | |
Elfutils Project Elfutils | =0.158 | |
redhat/elfutils | <0.160 | 0.160 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.