Описание
A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.
A flaw was found in binutils. The copy_section
function in binutils/objcopy.c
is susceptible to a heap-based buffer overflow due to improper bounds checking during data copying. This flaw allows a local attacker to provide a specially crafted file. This manipulation can lead to a denial of service.
Отчет
The Moderate severity rating is based on the requirement of local access for an attacker to exploit this vulnerability. Although a successful exploit could lead to heap-based buffer overflow, the prerequisite of having an established presence on the system lowers the risk compared to remotely exploitable vulnerabilities. Red Hat products widely use GNU Binutils, a fundamental set of programming tools for creating and managing binary files, which makes this a component of significant interest. However, the attack vector significantly mitigates the immediate risk to systems.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 10 | binutils | Fix deferred | ||
Red Hat Enterprise Linux 10 | gcc-toolset-15-binutils | Fix deferred | ||
Red Hat Enterprise Linux 10 | gdb | Not affected | ||
Red Hat Enterprise Linux 10 | mingw-binutils | Fix deferred | ||
Red Hat Enterprise Linux 6 | binutils | Not affected | ||
Red Hat Enterprise Linux 7 | binutils | Fix deferred | ||
Red Hat Enterprise Linux 7 | gdb | Not affected | ||
Red Hat Enterprise Linux 8 | binutils | Fix deferred | ||
Red Hat Enterprise Linux 8 | gcc-toolset-13-binutils | Fix deferred | ||
Red Hat Enterprise Linux 8 | gcc-toolset-13-gdb | Not affected |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
5.3 Medium
CVSS3
Связанные уязвимости
A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic was found in GNU Binutils 2. ...
A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.
5.3 Medium
CVSS3