First published: Wed Apr 25 2018(Updated: )
concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by nm-new.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.30 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6327533b1fd29fa86f6bf34e61c332c010e3c689
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-10373.
The title of the vulnerability is 'concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd)'.
The severity level of CVE-2018-10373 is low.
The affected software is the Binary File Descriptor (BFD) library (aka libbfd) as distributed in GNU Binutils 2.30.
An attacker can exploit CVE-2018-10373 by sending a crafted binary file, which can cause a denial of service (NULL pointer dereference and application crash).