First published: Mon Mar 05 2018(Updated: )
A flaw was found in the read_attribute_value function in dwarf2.c file in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils up to version 2.30, when compiled in 32bit mode. This allows attackers to cause a denial of service (integer wraparound and application crash) via an ELF file with a corrupt DWARF FORM block. References: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22895">https://sourceware.org/bugzilla/show_bug.cgi?id=22895</a> Patch: <a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=12c963421d045a127c413a0722062b9932c50aa9">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=12c963421d045a127c413a0722062b9932c50aa9</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu/binutils | <2.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1551778 is classified as high due to its potential to cause a denial of service.
To fix REDHAT-BUG-1551778, users should upgrade to a newer version of GNU Binutils beyond version 2.30.
REDHAT-BUG-1551778 affects GNU Binutils versions up to and including 2.30 when compiled in 32-bit mode.
REDHAT-BUG-1551778 is a denial of service vulnerability caused by an integer wraparound in the read_attribute_value function.
Yes, REDHAT-BUG-1551778 can potentially be exploited remotely by an attacker to crash the application.