Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-4807

Опубликовано: 31 дек. 2005
Источник: debian
EPSS Средний

Описание

Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
binutilsfixed2.17-1package
binutilsno-dsasargepackage

EPSS

Процентиль: 94%
0.13593
Средний

Связанные уязвимости

ubuntu
около 20 лет назад

Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code.

nvd
около 20 лет назад

Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code.

github
почти 4 года назад

Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code.

EPSS

Процентиль: 94%
0.13593
Средний