First published: Thu Mar 08 2018(Updated: )
The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy. Upstream issue: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22887">https://sourceware.org/bugzilla/show_bug.cgi?id=22887</a> Upstream patches: <a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=116acb2c268c89c89186673a7c92620d21825b25">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=116acb2c268c89c89186673a7c92620d21825b25</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu/binutils | ||
GNU Binutils (libbfd) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1553115 is classified as a denial of service vulnerability due to a NULL pointer dereference in the BFD library.
To fix REDHAT-BUG-1553115, update the GNU Binutils package to a version that includes the patch for this vulnerability.
The potential impacts of REDHAT-BUG-1553115 include application crashes and denial of service when processing crafted ELF files.
REDHAT-BUG-1553115 affects GNU Binutils and GNU libbfd in versions prior to the patch being implemented.
Yes, REDHAT-BUG-1553115 can be exploited remotely through specially crafted ELF files sent to the vulnerable application.