First published: Tue Aug 29 2017(Updated: )
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not validate the PLT section size, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to elf_i386_get_synthetic_symtab in elf32-i386.c and elf_x86_64_get_synthetic_symtab in elf64-x86-64.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu/binutils | =2.29 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=90efb6422939ca031804266fba669f77c22a274a
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13757 has been categorized with a severity rating that indicates a denial of service risk due to heap-based buffer over-read.
To fix CVE-2017-13757, it is recommended to upgrade GNU Binutils to a version later than 2.29 that addresses this vulnerability.
CVE-2017-13757 can be exploited by remote attackers using crafted ELF files to cause application crashes.
CVE-2017-13757 specifically affects GNU Binutils version 2.29.
While CVE-2017-13757 may result in application crashes, it typically manifests as a denial of service rather than direct data loss.