First published: Thu Oct 05 2017(Updated: )
read_formatted_entries in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not properly validate the format count, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu/binutils | =2.29 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15023 is classified as a medium severity vulnerability due to its potential to cause denial of service.
To fix CVE-2017-15023, upgrade to a version of GNU Binutils later than 2.29 that addresses this vulnerability.
CVE-2017-15023 affects GNU Binutils version 2.29 specifically through the read_formatted_entries function in the BFD library.
CVE-2017-15023 allows remote attackers to exploit the vulnerability leading to a denial of service through crafted ELF files.
CVE-2017-15023 primarily allows remote exploitation, making it more critical on systems processing untrusted ELF files.