First published: Fri Feb 24 2017(Updated: )
Integer overflow in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to inconsistent use of the long and int types for lengths.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU libiberty | ||
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 | |
debian/ht | 2.1.0+repack1-5 | |
debian/libiberty | 20210106-1 20230104-1 20240117-1 20241020-1 |
https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=fa3fcee7b8c73070306ec358e730d1dfcac246bf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4490 is a vulnerability in libiberty that allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.
CVE-2016-4490 affects the following software: binutils (versions up to but not including 2.28), gdb (versions up to but not including 7.7.1-0ubuntu5~14.04.3 and 7.11.1-0ubuntu1~16.5), libiberty (versions up to but not including 20131116-1ubuntu0.2 and 20160215-1ubuntu0.2), and valgrind (versions up to but not including 1:3.10.1-1ubuntu3~14.5, 1:3.11.0-1ubuntu4.2, and 1:3.12.0~).
To exploit CVE-2016-4490, an attacker would need to send a specially crafted binary to the target system.
CVE-2016-4490 is a denial of service vulnerability, which could potentially lead to a crash or segmentation fault on the affected system.
To fix CVE-2016-4490, update the affected software to a version that includes the necessary patches and security fixes.