Описание
Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| ht | fixed | 2.1.0+repack1-1 | package | |
| ht | no-dsa | jessie | package | |
| ht | no-dsa | wheezy | package | |
| binutils | fixed | 2.27.51.20161102-1 | package | |
| binutils | ignored | jessie | package | |
| libiberty | fixed | 20161011-1 | package | |
| libiberty | no-dsa | jessie | package | |
| libiberty | no-dsa | wheezy | package |
Примечания
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://gcc.gnu.org/viewcvs/gcc?view=revision&revision=234829
Связанные уязвимости
Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.
Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.
Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.
Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.