First published: Thu Mar 08 2018(Updated: )
The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump. Upstream issue: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22905">https://sourceware.org/bugzilla/show_bug.cgi?id=22905</a> Upstream patch: <a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d11ae95ea3403559f052903ab053f43ad7821e37">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d11ae95ea3403559f052903ab053f43ad7821e37</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu/binutils | =2.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1553119 is classified as a denial of service vulnerability due to an integer overflow that can cause application crashes.
To fix REDHAT-BUG-1553119, you should upgrade to a patched version of GNU Binutils that addresses the vulnerability.
The potential impacts of REDHAT-BUG-1553119 include denial of service through application crashes and possibly other unspecified effects when processing crafted ELF files.
REDHAT-BUG-1553119 affects GNU Binutils version 2.30.
REDHAT-BUG-1553119 can be exploited by attackers using crafted ELF files to trigger the integer overflow in the display_debug_ranges function.