Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-7227

Опубликовано: 02 дек. 2016
Источник: redhat
CVSS3: 3.3

Описание

GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5binutilsWill not fix
Red Hat Enterprise Linux 5binutils220Will not fix
Red Hat Enterprise Linux 6binutilsWill not fix
Red Hat Enterprise Linux 7binutilsWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-170
https://bugzilla.redhat.com/show_bug.cgi?id=1435303binutils: Heap-based buffer overflow in ld due to missing null termination

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 9 лет назад

GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.

CVSS3: 7.5
nvd
почти 9 лет назад

GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.

CVSS3: 7.5
debian
почти 9 лет назад

GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buf ...

CVSS3: 7.5
github
больше 3 лет назад

GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.

suse-cvrf
около 8 лет назад

Security update for binutils

3.3 Low

CVSS3