First published: Sun Apr 09 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/elfutils | 0.183-1 0.188-2.1 0.191-2 | |
CentOS Elfutils | =0.168 | |
Debian | =8.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 |
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7610 has been categorized as a moderate severity vulnerability that can lead to denial of service.
To fix CVE-2017-7610, update the elfutils package to versions newer than 0.168, specifically 0.183-1, 0.188-2.1, or 0.191-2.
CVE-2017-7610 involves a remote attacker exploiting a crafted ELF file to trigger a heap-based buffer over-read and cause an application crash.
CVE-2017-7610 affects elfutils version 0.168 running on systems such as Debian 8.0 and Ubuntu 14.04 or 16.04.
The impact of CVE-2017-7610 is a denial of service that results in an application crash when vulnerable systems process a malicious ELF file.