First published: Fri Feb 24 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU libiberty | ||
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 | |
debian/ht | 2.1.0+repack1-5 | |
debian/libiberty | 20210106-1 20230104-1 20240117-1 20241020-1 |
https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=fa3fcee7b8c73070306ec358e730d1dfcac246bf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-4488 is high.
CVE-2016-4488 is a use-after-free vulnerability in libiberty that allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.
The affected software versions for CVE-2016-4488 include binutils versions up to 2.26.1-1ubuntu1~16.04.8+, binutils version 2.28, libiberty versions up to 20131116-1ubuntu0.2, libiberty version 20160215-1ubuntu0.2, valgrind version 1:3.10.1-1ubuntu3~14.5, valgrind version 1:3.11.0-1ubuntu4.2, valgrind version 1:3.12.0~, gdb version 7.7.1-0ubuntu5~14.04.3, and gdb version 7.11.1-0ubuntu1~16.5.
Yes, there are known remedies for CVE-2016-4488. For binutils, update to version 2.26.1-1ubuntu1~16.04.8+ or version 2.28. For libiberty, update to version 20131116-1ubuntu0.2 or version 20160215-1ubuntu0.2. For valgrind, update to version 1:3.10.1-1ubuntu3~14.5, version 1:3.11.0-1ubuntu4.2, or version 1:3.12.0~. For gdb, update to version 7.7.1-0ubuntu5~14.04.3 or version 7.11.1-0ubuntu1~16.5.
You can find more information about CVE-2016-4488 at the following references: [link1](http://www.openwall.com/lists/oss-security/2016/05/05/5), [link2](https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481), [link3](http://www.securityfocus.com/bid/90025).