Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-9750

Опубликовано: 19 июн. 2017
Источник: debian
EPSS Низкий

Описание

opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
binutilsfixed2.29-1package
binutilsignoredstretchpackage
binutilsignoredjessiepackage
binutilsno-dsawheezypackage

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=21587

  • https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=db5fa770268baf8cc82cf9b141d69799fd485fe2

EPSS

Процентиль: 86%
0.02696
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVSS3: 3.3
redhat
больше 8 лет назад

opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVSS3: 7.8
nvd
больше 8 лет назад

opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVSS3: 7.8
github
больше 3 лет назад

opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

suse-cvrf
больше 7 лет назад

Security update for binutils

EPSS

Процентиль: 86%
0.02696
Низкий