First published: Tue Nov 11 2014(Updated: )
It was reported [1] that running strings, nm or objdump on a constructed PE file [2] leads to out-of bounds write to an unitialized memory area. Upstream path for this issue is at [3]. [1]: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=17512#c0">https://sourceware.org/bugzilla/show_bug.cgi?id=17512#c0</a> [2]: <a href="https://sourceware.org/bugzilla/attachment.cgi?id=7849">https://sourceware.org/bugzilla/attachment.cgi?id=7849</a> [3]: <a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e1e19887abd24aeb15066b141cdff5541e0ec8e">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e1e19887abd24aeb15066b141cdff5541e0ec8e</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | <=2.24 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =14.10 | |
Fedoraproject Fedora | =19 | |
Fedoraproject Fedora | =20 | |
Fedoraproject Fedora | =21 | |
redhat/binutils | <2.25 | 2.25 |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 | |
debian/binutils-mingw-w64 | 8.11 10.4 12 | |
debian/gdb | <=10.1-1.7<=13.1-3<=15.2-1 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e1e19887abd24aeb15066b141cdff5541e0ec8e
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8501 is a vulnerability in GNU binutils 2.24 and earlier that allows remote attackers to cause a denial of service (out-of-bounds write) and possibly have other unspecified impact via a crafted NumberOfRvaAndSizes field in the AOUT header in a PE executable.
GNU binutils versions 2.24 and earlier are affected by CVE-2014-8501.
CVE-2014-8501 has a severity level of low.
To fix CVE-2014-8501, update your GNU binutils to version 2.25 or higher.
You can find more information about CVE-2014-8501 at the following references: [Reference 1](http://www.openwall.com/lists/oss-security/2014/10/26/3), [Reference 2](http://www.openwall.com/lists/oss-security/2014/10/31/1), [Reference 3](https://bugzilla.redhat.com/show_bug.cgi?id=1162570)