Описание
Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted file.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
binutils | fixed | 2.24.90.20141104-1 | package | |
binutils-mingw-w64 | fixed | 5.2 | package |
Примечания
http://openwall.com/lists/oss-security/2014/10/27/4
http://openwall.com/lists/oss-security/2014/10/27/5
https://sourceware.org/bugzilla/show_bug.cgi?id=17510#c7
https://sourceware.org/bugzilla/show_bug.cgi?id=17510#c8
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=708d7d0d11f0f2d776171979aa3479e8e12a38a0
EPSS
Связанные уязвимости
Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted file.
Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted file.
Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted file.
Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted file.
ELSA-2015-2079: binutils security, bug fix, and enhancement update (MODERATE)
EPSS