First published: Mon Jun 19 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.28 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9755 is a vulnerability in the GNU Binutils 2.28 that allows remote attackers to cause a denial of service or possibly have other unspecified impacts through a crafted binary file.
CVE-2017-9755 occurs due to a buffer overflow and application crash in the opcodes/i386-dis.c file of GNU Binutils 2.28 when not considering the number of registers for bnd mode.
CVE-2017-9755 affects GNU Binutils 2.26.1-1ubuntu1~16.04.8+ to 2.29 (Ubuntu) and binutils 2.31.1-16 to 2.41-5 (Debian).
To fix CVE-2017-9755, update the GNU Binutils package to version 2.29 or later (Ubuntu), or version 2.41-5 or later (Debian).
More information about CVE-2017-9755 can be found at the following references: [link1](https://sourceware.org/bugzilla/show_bug.cgi?id=21594), [link2](http://www.securityfocus.com/bid/99124), [link3](https://security.gentoo.org/glsa/201801-01).