First published: Mon Sep 25 2017(Updated: )
The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, do not ensure a unique PLT entry for a symbol, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu/binutils | =2.29 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=56933f9e3e90eebf1018ed7417d6c1184b91db6b
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=61e3bf5f83f7e505b6bc51ef65426e5b31e6e360
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14729 has been classified with a medium severity due to its potential for denial of service and application crash.
To fix CVE-2017-14729, upgrade to a later version of GNU Binutils that addresses this vulnerability.
CVE-2017-14729 affects GNU Binutils version 2.29.
Exploitation of CVE-2017-14729 may lead to a heap-based buffer overflow, resulting in application crashes.
CVE-2017-14729 is considered a remote vulnerability as it can be exploited by remote attackers.