First published: Thu Oct 05 2017(Updated: )
dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles pointers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file, related to parse_die and parse_line_table, as demonstrated by a parse_die heap-based buffer over-read.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.29 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 |
https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-parse_die-dwarf1-c/
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1da5c9a485f3dcac4c45e96ef4b7dae5948314b5
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15020 is a vulnerability in the Binary File Descriptor (BFD) library in GNU Binutils 2.29, which can be exploited via a crafted ELF file to cause a denial of service or unspecified impact.
CVE-2017-15020 affects binutils versions 2.29 and possibly other versions, and can lead to a denial of service or other impact.
To fix CVE-2017-15020, update binutils to version 2.29.90.20180122-1 or apply the appropriate remedy provided by your distribution.
You can find more information about CVE-2017-15020 on the references provided: [Link1](https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-parse_die-dwarf1-c/), [Link2](https://sourceware.org/bugzilla/show_bug.cgi?id=22202), [Link3](https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1da5c9a485f3dcac4c45e96ef4b7dae5948314b5).