First published: Mon Dec 04 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.29.1 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=160b1a618ad94988410dc81fce9189fcda5b7ff4
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2017-17125.
The title of this vulnerability is 'nm.c and objdump.c in GNU Binutils 2.29.1 mishandle certain global symbols which allows remote attackers to cause a denial of service (_bfd_elf_get_symbol_version_string buffer over-read and application crash) or possibly have unspecified other impact via a crafted ELF file.'
The software affected by this vulnerability is GNU Binutils with versions 2.26.1-1ubuntu1~16.04.8+ to 2.29.90.20180122-1.
The vulnerability can be exploited by remote attackers through a crafted ELF file, causing a denial of service or possibly having other unspecified impact.
You can find more information about this vulnerability at the following references: [1] https://sourceware.org/bugzilla/show_bug.cgi?id=22443, [2] https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=160b1a618ad94988410dc81fce9189fcda5b7ff4, [3] https://security.gentoo.org/glsa/201811-17.