Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-1579

Опубликовано: 11 янв. 2023
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

Heap based buffer overflow in binutils-gdb/bfd/libbfd.c in bfd_getl64.

A heap based buffer overflow was found in binutils-gdb/bfd/libbfd.c in bfd_getl64 in binutils.

Отчет

Because this vulnerability requires that an unsuspecting user uses binutils-gdb to analyze a specially crafted malicious DWARF file, and because the consequences of the memory corruption caused by the flaw are limited to the privileges of the user who analyzes the malicious file, Red Hat assesses this vulnerability's impact as Moderate. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer to CWE-787: Out-of-bounds Write vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low. Boundary protection, access enforcement, and least privilege controls limit access to the platform and memory, ensuring only authorized users and processes can interact with sensitive components. This reduces the risk of attackers exploiting memory vulnerabilities. Configuration management controls like baseline configuration and least functionality can help prevent vulnerability exploitation by enforcing secure system configurations, enabling memory protection, and removing unnecessary services, ports, or functions that could be exploited. Memory protection controls mitigate the risk of potential memory corruption by enforcing runtime protections. Finally, process isolation and encryption of data at rest reduce the potential impacts in the case of successful exploitation by isolating compromised processes and ensuring sensitive data remains secure even in the event of memory corruption.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6binutilsOut of support scope
Red Hat Enterprise Linux 7binutilsOut of support scope
Red Hat Enterprise Linux 7gdbOut of support scope
Red Hat Enterprise Linux 8binutilsNot affected
Red Hat Enterprise Linux 8gcc-toolset-11-binutilsNot affected
Red Hat Enterprise Linux 8gcc-toolset-11-gdbNot affected
Red Hat Enterprise Linux 8gcc-toolset-12-binutilsNot affected
Red Hat Enterprise Linux 8gcc-toolset-12-gdbNot affected
Red Hat Enterprise Linux 8gdbNot affected
Red Hat Enterprise Linux 9binutilsWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-119->CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2180905binutils: Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64

EPSS

Процентиль: 16%
0.00051
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 2 лет назад

Heap based buffer overflow in binutils-gdb/bfd/libbfd.c in bfd_getl64.

CVSS3: 7.8
nvd
около 2 лет назад

Heap based buffer overflow in binutils-gdb/bfd/libbfd.c in bfd_getl64.

CVSS3: 7.8
debian
около 2 лет назад

Heap based buffer overflow in binutils-gdb/bfd/libbfd.c in bfd_getl64.

CVSS3: 7.8
github
около 2 лет назад

Heap based buffer overflow in binutils-gdb/bfd/libbfd.c in bfd_getl64.

oracle-oval
около 1 года назад

ELSA-2024-2353: mingw components security update (MODERATE)

EPSS

Процентиль: 16%
0.00051
Низкий

7 High

CVSS3