First published: Thu May 03 2018(Updated: )
A flaw was found in the ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a "SECTION" type that has a "0" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy. References: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23113">https://sourceware.org/bugzilla/show_bug.cgi?id=23113</a> Patch: <a href="https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=db0c309f4011ca94a4abc8458e27f3734dab92ac">https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=db0c309f4011ca94a4abc8458e27f3734dab92ac</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu/binutils | ||
GNU Binutils (libbfd) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1574697 is critical due to the potential for remote attack exploitation.
To fix REDHAT-BUG-1574697, update your GNU Binutils to a version that addresses this vulnerability.
REDHAT-BUG-1574697 affects GNU Binutils versions prior to 2.30.
REDHAT-BUG-1574697 impacts software using the Binary File Descriptor (BFD) library, specifically GNU Binutils and its components.
Yes, there are reports indicating that REDHAT-BUG-1574697 may be exploitable, warranting immediate attention.