First published: Thu May 18 2017(Updated: )
GNU Binutils 2.28 allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file with many program headers, related to the get_program_headers function in readelf.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.28 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=82156ab704b08b124d319c0decdbd48b3ca2dac5
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9039 is a vulnerability in GNU Binutils 2.28 that allows remote attackers to cause a denial of service by consuming excessive memory.
CVE-2017-9039 can result in a denial of service (memory consumption) if an attacker sends a crafted ELF file with many program headers.
GNU Binutils versions 2.28-6 and earlier are affected by CVE-2017-9039.
To mitigate the impact of CVE-2017-9039, update your GNU Binutils installation to version 2.28-7 or later.
You can find more information about CVE-2017-9039 at the following references: [Gentoo Blog](https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/), [Sourceware Git](https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=82156ab704b08b124d319c0decdbd48b3ca2dac5), [SecurityFocus](http://www.securityfocus.com/bid/98580)