Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-7546

Опубликовано: 13 июл. 2025
Источник: redhat
CVSS3: 5.3

Описание

A vulnerability, which was classified as problematic, has been found in GNU Binutils 2.45. Affected by this issue is the function bfd_elf_set_group_contents of the file bfd/elf.c. The manipulation leads to out-of-bounds write. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The name of the patch is 41461010eb7c79fee7a9d5f6209accdaac66cc6b. It is recommended to apply a patch to fix this issue.

A flaw was found in gnu-binutils. The bfd_elf_set_group_contents function in bfd/elf.c contains an out-of-bounds write vulnerability triggered by manipulation of the ELF file contents. This flaw allows a local attacker to provide a crafted file. This manipulation can lead to memory corruption.

Отчет

The Moderate severity rating is based on the requirement of local access for an attacker to exploit this vulnerability. Although a successful exploit could lead to out-of-bounds write, the prerequisite of having an established presence on the system lowers the risk compared to remotely exploitable vulnerabilities. Red Hat products widely use GNU Binutils, a fundamental set of programming tools for creating and managing binary files, which makes this a component of significant interest. However, the attack vector significantly mitigates the immediate risk to systems. Within regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer or a CWE-787: Out-of-bounds Write vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low. Boundary protection, access enforcement, and least privilege controls limit access to the platform and memory, ensuring only authorized users and processes can interact with sensitive components. This reduces the risk of attackers exploiting memory vulnerabilities. Configuration management controls like baseline configuration and least functionality can help prevent vulnerability exploitation by enforcing secure system configurations, enabling memory protection, and removing unnecessary services, ports, or functions that could be exploited. Memory protection controls mitigate the risk of potential memory corruption by enforcing runtime protections. Finally, process isolation and encryption of data at rest reduce the potential impacts in the case of successful exploitation by isolating compromised processes and ensuring sensitive data remains secure even in the event of memory corruption.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10binutilsFix deferred
Red Hat Enterprise Linux 10gcc-toolset-15-binutilsFix deferred
Red Hat Enterprise Linux 10gdbNot affected
Red Hat Enterprise Linux 10mingw-binutilsFix deferred
Red Hat Enterprise Linux 6binutilsNot affected
Red Hat Enterprise Linux 7binutilsFix deferred
Red Hat Enterprise Linux 7gdbNot affected
Red Hat Enterprise Linux 8binutilsFix deferred
Red Hat Enterprise Linux 8gcc-toolset-13-binutilsFix deferred
Red Hat Enterprise Linux 8gcc-toolset-13-gdbNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-119
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2379793binutils: Binutils: Out-of-bounds Write Vulnerability

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
3 месяца назад

A vulnerability, which was classified as problematic, has been found in GNU Binutils 2.45. Affected by this issue is the function bfd_elf_set_group_contents of the file bfd/elf.c. The manipulation leads to out-of-bounds write. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The name of the patch is 41461010eb7c79fee7a9d5f6209accdaac66cc6b. It is recommended to apply a patch to fix this issue.

CVSS3: 5.3
nvd
3 месяца назад

A vulnerability, which was classified as problematic, has been found in GNU Binutils 2.45. Affected by this issue is the function bfd_elf_set_group_contents of the file bfd/elf.c. The manipulation leads to out-of-bounds write. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The name of the patch is 41461010eb7c79fee7a9d5f6209accdaac66cc6b. It is recommended to apply a patch to fix this issue.

CVSS3: 7.8
msrc
2 месяца назад

Описание отсутствует

CVSS3: 5.3
debian
3 месяца назад

A vulnerability, which was classified as problematic, has been found i ...

CVSS3: 5.3
github
3 месяца назад

A vulnerability, which was classified as problematic, has been found in GNU Binutils 2.45. Affected by this issue is the function bfd_elf_set_group_contents of the file bfd/elf.c. The manipulation leads to out-of-bounds write. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The name of the patch is 41461010eb7c79fee7a9d5f6209accdaac66cc6b. It is recommended to apply a patch to fix this issue.

5.3 Medium

CVSS3