First published: Fri Feb 24 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU libiberty | ||
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 | |
debian/ht | 2.1.0+repack1-5 | |
debian/libiberty | 20210106-1 20230104-1 20241020-1 |
https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=fa3fcee7b8c73070306ec358e730d1dfcac246bf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4487 is a use-after-free vulnerability in libiberty that allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.
The affected software includes binutils, libiberty, valgrind, and gdb.
The vulnerability can be exploited by remote attackers using a crafted binary.
The severity of CVE-2016-4487 is high as it can lead to a denial of service.
Yes, the recommended fix is to update the affected software to the specified versions.