First published: Wed Jul 24 2019(Updated: )
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Binutils | =2.32 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
debian/binutils | 2.35.2-2 2.40-2 2.43.50.20241215-1 2.43.50.20241221-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-14250.
The title of the vulnerability is 'An issue was discovered in GNU libiberty as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.'
The impact of CVE-2019-14250 is a heap-based buffer overflow, which can potentially be exploited by an attacker to execute arbitrary code or crash the affected system.
To fix CVE-2019-14250, you should update to GNU Binutils version 2.33 or higher.
Yes, you can find references for CVE-2019-14250 at the following links: [Link 1](https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924), [Link 2](https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html), [Link 3](http://www.securityfocus.com/bid/109354).