First published: Mon Feb 10 2025(Updated: )
A vulnerability has been found in GNU Binutils 2.43 and classified as problematic. Affected by this vulnerability is the function __sanitizer::internal_strlen of the file binutils/nm.c of the component nm. The manipulation of the argument const leads to buffer overflow. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Binutils |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1147 is classified as a problematic vulnerability due to the risk of buffer overflow.
To fix CVE-2025-1147, update to a patched version of GNU Binutils that resolves the identified buffer overflow vulnerability.
GNU Binutils version 2.43 is affected by CVE-2025-1147.
CVE-2025-1147 is a buffer overflow vulnerability within the internal_strlen function of the nm component.
Exploitation of CVE-2025-1147 may allow an attacker to execute arbitrary code if successful.