First published: Fri Aug 04 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | <=2.29 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2017-12452.
The affected software is GNU Binutils 2.29 and earlier.
Remote attackers can exploit this vulnerability by crafting a malicious mach-o file that triggers an out of bounds heap read in the bfd_mach_o_i386_canonicalize_one_reloc function of the Binary File Descriptor (BFD) library.
Versions 2.29 and earlier of binutils are vulnerable to this issue.
Yes, patches are available to fix this vulnerability. For Ubuntu, the recommended version is 2.29.1. For Debian, the recommended versions are 2.31.1-16, 2.35.2-2, 2.40-2, and 2.41-5.