Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-7210

Опубликовано: 21 мар. 2017
Источник: debian

Описание

objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
binutilsfixed2.28-3package
binutilsignoredjessiepackage
binutilsno-dsawheezypackage

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=21157

  • https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a2dea0b20bc66a4c287c3c50002b8c3b3e9d953a

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 9 лет назад

objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.

CVSS3: 3.3
redhat
почти 9 лет назад

objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.

CVSS3: 5.5
nvd
почти 9 лет назад

objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.

CVSS3: 5.5
github
больше 3 лет назад

objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.

suse-cvrf
больше 7 лет назад

Security update for binutils