First published: Tue Oct 23 2018(Updated: )
A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.31 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
NetApp Data ONTAP | ||
debian/binutils | 2.35.2-2 2.40-2 2.43.1-5 |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ab419ddbb2cdd17ca83618990f2cacf904ce1d61
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18605 is a heap-based buffer over-read vulnerability in the Binary File Descriptor (BFD) library (libbfd) as distributed in GNU Binutils 2.31.
CVE-2018-18605 can allow an attacker to read beyond the intended boundaries of a buffer in memory, potentially leading to information disclosure or a crash.
The affected software includes binutils versions 2.26.1-1ubuntu1~16.04.8+, 2.30-21ubuntu1~18.04.3, and debian/binutils versions up to 2.31.1-16.
Update the affected software to version 2.26.1-1ubuntu1~16.04.8+ for Ubuntu 16.04, 2.30-21ubuntu1~18.04.3 for Ubuntu 18.04, or versions 2.35.2-2, 2.40-2, or 2.41-5 for Debian.
You can find more information about CVE-2018-18605 at the following references: [1] [2] [3].