First published: Wed Nov 15 2017(Updated: )
coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate the symbol count, which allows remote attackers to cause a denial of service (integer overflow and application crash, or excessive memory allocation) or possibly have unspecified other impact via a crafted PE file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.29.1 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6cee897971d4d7cd37d2a686bb6d2aa3e759c8ca
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16831 is a vulnerability in the Binary File Descriptor (BFD) library, as distributed in GNU Binutils 2.29.1, that allows remote attackers to cause a denial of service or possibly have unspecified impact.
The Binutils package, specifically version 2.29.1, is affected by CVE-2017-16831.
To fix CVE-2017-16831, it is recommended to update the Binutils package to version 2.29.90.20180122-1 or newer.
The severity of CVE-2017-16831 is not specified, but it can result in a denial of service or possibly have other unspecified impacts.
You can find more information about CVE-2017-16831 on the Sourceware Bugzilla page, the Binutils Git repository, and the Gentoo Security Advisory.