Описание
Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code.
Ссылки
- PatchThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- Broken Link
- ExploitPatchThird Party AdvisoryVDB Entry
- PatchThird Party Advisory
- Permissions Required
- PatchThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- Broken Link
- ExploitPatchThird Party AdvisoryVDB Entry
- PatchThird Party Advisory
- Permissions Required
Уязвимые конфигурации
Одно из
EPSS
7.5 High
CVSS2
Дефекты
Связанные уязвимости
Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code.
Stack-based buffer overflow in the as_bad function in messages.c in th ...
Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code.
EPSS
7.5 High
CVSS2