First published: Fri Feb 24 2017(Updated: )
Integer overflow in the gnu_special function in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to the "demangling of virtual tables."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU libiberty | ||
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 | |
debian/ht | 2.1.0+repack1-5 | |
debian/libiberty | 20210106-1 20230104-1 20241020-1 |
https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=fa3fcee7b8c73070306ec358e730d1dfcac246bf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4489 is a vulnerability in the gnu_special function in libiberty that allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.
CVE-2016-4489 is a vulnerability that can cause a denial of service (segmentation fault and crash), making it moderately severe.
The following software is affected by CVE-2016-4489: binutils, libiberty, valgrind, and gdb.
To fix CVE-2016-4489, users should update the affected software to the recommended versions provided by their respective sources.
You can find more information about CVE-2016-4489 at the following references: [1](http://www.openwall.com/lists/oss-security/2016/05/05/5), [2](https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492), [3](http://www.securityfocus.com/bid/90017).