First published: Thu May 18 2017(Updated: )
GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to MIPS GOT mishandling in the process_mips_specific function in readelf.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.28 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75ec1fdbb797a389e4fe4aaf2e15358a070dcc19
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c4ab9505b53cdc899506ed421fddb7e1f8faf7a3
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9041 is a vulnerability in GNU Binutils 2.28 that allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
CVE-2017-9041 can cause a denial of service (heap-based buffer over-read and application crash) in GNU Binutils 2.28.
GNU Binutils versions 2.28 and earlier are affected by CVE-2017-9041.
To fix CVE-2017-9041 in Ubuntu 16.04, update to version 2.26.1-1ubuntu1~16.04.8 or later of the binutils package.
To fix CVE-2017-9041 in Debian, update to version 2.31.1-16, 2.35.2-2, 2.40-2, or 2.41-5 of the binutils package.