First published: Tue Nov 11 2014(Updated: )
A heap overflow was reborted [1] when running objdump on a specially crafted PE executable [2]. Upstream patches that address this are at [3] and [4]. [1]: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=17512#c17">https://sourceware.org/bugzilla/show_bug.cgi?id=17512#c17</a> [2]: <a href="https://sourceware.org/bugzilla/attachment.cgi?id=7862">https://sourceware.org/bugzilla/attachment.cgi?id=7862</a> [3]: <a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5a4b0ccc20ba30caef53b01bee2c0aaa5b855339">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5a4b0ccc20ba30caef53b01bee2c0aaa5b855339</a> [4]: <a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=acafeb6056bec47d7211cf462a7c211a8c95cf42">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=acafeb6056bec47d7211cf462a7c211a8c95cf42</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject Fedora | =19 | |
Fedoraproject Fedora | =20 | |
Fedoraproject Fedora | =21 | |
GNU Binutils | <=2.24 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =14.10 | |
redhat/binutils | <2.25 | 2.25 |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 | |
debian/binutils-mingw-w64 | 8.11 10.4 12 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5a4b0ccc20ba30caef53b01bee2c0aaa5b855339
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2014-8502.
The title of this vulnerability is "Heap-based buffer overflow in the pe_print_edata function in bfd/peXXigen.c in GNU binutils 2.24 and..."
The severity of CVE-2014-8502 is low.
CVE-2014-8502 affects GNU binutils versions 2.24 and earlier.
To fix CVE-2014-8502, update GNU binutils to version 2.25 or later.