First published: Fri Feb 24 2017(Updated: )
Buffer overflow in the do_type function in cplus-dem.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU libiberty | ||
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 | |
debian/ht | 2.1.0+repack1-5 | |
debian/libiberty | 20210106-1 20230104-1 20241020-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4492 is a vulnerability in the libiberty library that allows remote attackers to cause a denial of service.
CVE-2016-4492 affects the binutils, gdb, libiberty, and valgrind packages on Ubuntu and Debian.
The severity of CVE-2016-4492 is not specified.
To fix CVE-2016-4492, update the affected packages to the recommended versions.
You can find more information about CVE-2016-4492 in the references provided.