Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-6969

Опубликовано: 17 мар. 2017
Источник: debian
EPSS Низкий

Описание

readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
binutilsfixed2.28-3package
binutilsignoredjessiepackage
binutilsno-dsawheezypackage

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=21156

  • https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b814a36d3440de95f2ac6eaa4fc7935c322ea456

  • https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=43a444f9c5bfd44b4304eafd78338e21d54bea14

EPSS

Процентиль: 63%
0.00455
Низкий

Связанные уязвимости

CVSS3: 9.1
ubuntu
почти 9 лет назад

readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.

CVSS3: 4.4
redhat
почти 9 лет назад

readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.

CVSS3: 9.1
nvd
почти 9 лет назад

readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.

CVSS3: 9.1
github
больше 3 лет назад

readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.

suse-cvrf
больше 7 лет назад

Security update for binutils

EPSS

Процентиль: 63%
0.00455
Низкий