First published: Sun Oct 29 2017(Updated: )
elfcomm.c in readelf in GNU Binutils 2.29 allows remote attackers to cause a denial of service (excessive memory allocation) or possibly have unspecified other impact via a crafted ELF file that triggers a "buffer overflow on fuzzed archive header," related to an uninitialized variable, an improper conditional jump, and the get_archive_member_name, process_archive_index_and_symbols, and setup_archive functions.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.29 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d91f0b20e561e326ee91a09a76206257bde8438b
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15996 is a vulnerability in GNU Binutils 2.29 that allows remote attackers to cause a denial of service or possibly have other unspecified impact via a crafted ELF file.
CVE-2017-15996 can cause a denial of service due to excessive memory allocation or potentially have other unspecified impact.
The affected software for CVE-2017-15996 is GNU Binutils version 2.29.
To fix the CVE-2017-15996 vulnerability in Ubuntu, update the binutils package to version 2.26.1-1ubuntu1~16.04.8+ or higher.
Yes, to fix the CVE-2017-15996 vulnerability in Debian, update the binutils package to version 2.31.1-16, 2.35.2-2, 2.40-2, or 2.41-5.