First published: Thu Nov 30 2017(Updated: )
elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate sizes of core notes, which allows remote attackers to cause a denial of service (bfd_getl32 heap-based buffer over-read and application crash) via a crafted object file, related to elfcore_grok_netbsd_procinfo, elfcore_grok_openbsd_procinfo, and elfcore_grok_nto_status.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.29.1 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=80a0437873045cc08753fcac4af154e2931a99fd
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17080 is a vulnerability in the Binary File Descriptor (BFD) library, as distributed in GNU Binutils 2.29.1, that allows remote attackers to cause a denial of service.
CVE-2017-17080 affects the Binutils package in Ubuntu versions 16.04.8 and later, as well as the Binutils package in Debian versions 2.31.1-16, 2.35.2-2, 2.40-2, and 2.41-5.
The severity of CVE-2017-17080 is not specified.
To fix CVE-2017-17080, update the Binutils package to a version that includes the necessary security patches. Refer to the vendor's website for the appropriate updates.
More information about CVE-2017-17080 can be found on the Sourceware Bugzilla and Gentoo Security websites.