Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-7642

Опубликовано: 02 мар. 2018
Источник: debian

Описание

The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
binutilsfixed2.30-6package
binutilsignoredstretchpackage
binutilsignoredjessiepackage
binutilsignoredwheezypackage

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=22887

  • https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=116acb2c268c89c89186673a7c92620d21825b25

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 7 лет назад

The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.

CVSS3: 3.3
redhat
больше 7 лет назад

The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.

CVSS3: 5.5
nvd
больше 7 лет назад

The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.

CVSS3: 5.5
github
больше 3 лет назад

The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.

CVSS3: 5.5
fstec
больше 7 лет назад

Уязвимость функции swap_std_reloc_in программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании