First published: Sat Sep 30 2017(Updated: )
decode_line_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles a length calculation, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to read_1_byte.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.29 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 |
https://blogs.gentoo.org/ago/2017/09/26/binutils-heap-based-buffer-overflow-in-read_1_byte-dwarf2-c/
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=515f23e63c0074ab531bc954f84ca40c6281a724
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14939 is a vulnerability in the Binary File Descriptor (BFD) library, also known as libbfd, as distributed in GNU Binutils 2.29.
CVE-2017-14939 allows remote attackers to cause a denial of service by exploiting a length calculation flaw in the decode_line_info function in dwarf2.c, which results in a heap-based buffer over-read and application crash.
The affected software versions include binutils 2.26.1-1ubuntu1~16.04.8+, 2.29.90.20180122-1, 2.31.1-16, 2.35.2-2, 2.40-2, 2.41-5.
For Ubuntu, the recommended remedy is to update binutils package to version 2.29.90.20180122-1 or later.
You can find more information about CVE-2017-14939 at the following sources: [1] https://blogs.gentoo.org/ago/2017/09/26/binutils-heap-based-buffer-overflow-in-read_1_byte-dwarf2-c/ [2] https://sourceware.org/bugzilla/show_bug.cgi?id=22169 [3] https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=515f23e63c0074ab531bc954f84ca40c6281a724