Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-9755

Опубликовано: 19 июн. 2017
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.8
CVSS3: 7.8

Описание

opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

РелизСтатусПримечание
artful

not-affected

2.29-1ubuntu1
bionic

not-affected

2.29-1ubuntu1
cosmic

not-affected

2.29-1ubuntu1
devel

not-affected

2.29-1ubuntu1
disco

not-affected

2.29-1ubuntu1
eoan

not-affected

2.29-1ubuntu1
esm-infra-legacy/trusty

needed

esm-infra/bionic

not-affected

2.29-1ubuntu1
esm-infra/focal

not-affected

2.29-1ubuntu1
esm-infra/xenial

released

2.26.1-1ubuntu1~16.04.8+esm1

Показывать по

EPSS

Процентиль: 77%
0.01071
Низкий

6.8 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 3.3
redhat
около 8 лет назад

opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVSS3: 7.8
nvd
около 8 лет назад

opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVSS3: 7.8
debian
около 8 лет назад

opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number o ...

CVSS3: 7.8
github
больше 3 лет назад

opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

suse-cvrf
почти 7 лет назад

Security update for binutils

EPSS

Процентиль: 77%
0.01071
Низкий

6.8 Medium

CVSS2

7.8 High

CVSS3