First published: Mon Mar 05 2018(Updated: )
A flaw was found in the parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd) as distributed in GNU Binutils up to version 2.30, when compiled in 32bit mode. This vulnerability allows attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupted dwarf1 debug information. References: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22894">https://sourceware.org/bugzilla/show_bug.cgi?id=22894</a> Patch: <a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=eef104664efb52965d85a28bc3fc7c77e52e48e2">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=eef104664efb52965d85a28bc3fc7c77e52e48e2</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu/binutils | <2.30 | |
GNU Binutils (libbfd) | <2.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1551771 has a severity that can lead to denial of service due to an integer overflow and application crash.
To fix REDHAT-BUG-1551771, upgrade to a version of GNU Binutils greater than 2.30.
REDHAT-BUG-1551771 affects GNU Binutils up to version 2.30 and the BFD library (libbfd) in the same version range.
The vulnerability in REDHAT-BUG-1551771 is caused by a flaw in the parse_die function within the BFD library when running in 32-bit mode.
REDHAT-BUG-1551771 does not pose a direct remote exploitation risk as it primarily leads to a local denial of service.