First published: Tue May 01 2018(Updated: )
GNU Binutils through version 2.30 has a heap-based buffer over-read vulnerability in dwarf.c:process_cu_tu_index(). An attacker could exploit this to crash the readelf application by providing a binary file. Upstream Issue: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23064">https://sourceware.org/bugzilla/show_bug.cgi?id=23064</a> Upstream Patch: <a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6aea08d9f3e3d6475a65454da488a0c51f5dc97d">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6aea08d9f3e3d6475a65454da488a0c51f5dc97d</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu/binutils | <=2.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1573356 is high due to the potential for an attacker to crash the readelf application.
To fix REDHAT-BUG-1573356, update GNU Binutils to a version newer than 2.30.
REDHAT-BUG-1573356 is classified as a heap-based buffer over-read vulnerability.
Yes, REDHAT-BUG-1573356 can potentially be exploited remotely by providing a malicious binary file.
GNU Binutils versions up to and including 2.30 are affected by REDHAT-BUG-1573356.