First published: Wed Apr 09 2014(Updated: )
Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/elfutils | <0.160 | 0.160 |
CentOS Elfutils | =0.153 | |
CentOS Elfutils | =0.154 | |
CentOS Elfutils | =0.155 | |
CentOS Elfutils | =0.156 | |
CentOS Elfutils | =0.157 | |
CentOS Elfutils | =0.158 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0172 is a medium severity vulnerability that can lead to application crashes or potentially allow arbitrary code execution.
To fix CVE-2014-0172, upgrade the elfutils package to version 0.160 or later.
CVE-2014-0172 affects elfutils versions 0.153 through 0.158.
CVE-2014-0172 enables remote attackers to perform denial of service attacks or potentially execute arbitrary code.
Users and systems utilizing affected versions of elfutils are at risk of CVE-2014-0172.