Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0172

Опубликовано: 09 апр. 2014
Источник: redhat
CVSS2: 4.4
EPSS Низкий

Описание

Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Developer Toolset 2.1devtoolset-2-elfutilsAffected
Red Hat Enterprise Linux 5elfutilsNot affected
Red Hat Enterprise Linux 6elfutilsNot affected
Red Hat Enterprise Linux 7elfutilsFixedRHEA-2015:036905.03.2015

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190->CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1085663elfutils: integer overflow, leading to a heap-based buffer overflow in libdw

EPSS

Процентиль: 83%
0.01832
Низкий

4.4 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 12 лет назад

Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.

nvd
почти 12 лет назад

Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.

debian
почти 12 лет назад

Integer overflow in the check_section function in dwarf_begin_elf.c in ...

github
больше 3 лет назад

Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.

EPSS

Процентиль: 83%
0.01832
Низкий

4.4 Medium

CVSS2