First published: Mon Jun 26 2017(Updated: )
The get_build_id function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file in which a certain size field is larger than a corresponding data field, as demonstrated by mishandling within the objdump program.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu/binutils | =2.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9955 is classified as a denial of service vulnerability that can cause a heap-based buffer over-read leading to application crashes.
To fix CVE-2017-9955, it is recommended to upgrade to a patched version of GNU Binutils beyond 2.28.
CVE-2017-9955 affects the GNU Binutils version 2.28.
Yes, CVE-2017-9955 can be exploited remotely through a crafted file that triggers the vulnerability.
The consequences of CVE-2017-9955 include application crashes and potential service disruption due to denial of service.