Описание
opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 2.29-1ubuntu1 |
| bionic | not-affected | 2.29-1ubuntu1 |
| cosmic | not-affected | 2.29-1ubuntu1 |
| devel | not-affected | 2.29-1ubuntu1 |
| disco | not-affected | 2.29-1ubuntu1 |
| eoan | not-affected | 2.29-1ubuntu1 |
| esm-infra-legacy/trusty | needed | |
| esm-infra/bionic | not-affected | 2.29-1ubuntu1 |
| esm-infra/focal | not-affected | 2.29-1ubuntu1 |
| esm-infra/xenial | released | 2.26.1-1ubuntu1~16.04.8+esm1 |
Показывать по
EPSS
6.8 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number o ...
opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
EPSS
6.8 Medium
CVSS2
7.8 High
CVSS3