First published: Tue Jun 26 2018(Updated: )
A flaw was found in finish_stab in stabs.c in GNU Binutils 2.30 which allows attackers to cause a denial of service (heap-based buffer overflow) as demonstrated by an out-of-bounds write of 8 bytes. References: <a href="https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102">https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102</a> <a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454</a> <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=23057">https://sourceware.org/bugzilla/show_bug.cgi?id=23057</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu/binutils |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1595427 is classified as a denial of service vulnerability due to a heap-based buffer overflow.
REDHAT-BUG-1595427 affects GNU Binutils by allowing attackers to perform an out-of-bounds write, potentially crashing the application.
The vulnerability REDHAT-BUG-1595427 specifically affects GNU Binutils version 2.30.
Mitigation for REDHAT-BUG-1595427 can be achieved by updating to a patched version of GNU Binutils.
Yes, there are known exploits for REDHAT-BUG-1595427 that can demonstrate the heap-based buffer overflow in practice.