Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-9756

Опубликовано: 19 июн. 2017
Источник: debian
EPSS Низкий

Описание

The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
binutilsfixed2.29-1package
binutilsignoredstretchpackage
binutilsignoredjessiepackage
binutilsno-dsawheezypackage

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=21595

  • https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cd3ea7c69acc5045eb28f9bf80d923116e15e4f5

EPSS

Процентиль: 86%
0.02696
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVSS3: 3.3
redhat
больше 8 лет назад

The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVSS3: 7.8
nvd
больше 8 лет назад

The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVSS3: 7.8
github
больше 3 лет назад

The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

suse-cvrf
больше 7 лет назад

Security update for binutils

EPSS

Процентиль: 86%
0.02696
Низкий