Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-9756

Опубликовано: 19 июн. 2017
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.8
CVSS3: 7.8

Описание

The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

РелизСтатусПримечание
artful

not-affected

2.29-1ubuntu1
bionic

not-affected

2.29-1ubuntu1
cosmic

not-affected

2.29-1ubuntu1
devel

not-affected

2.29-1ubuntu1
disco

not-affected

2.29-1ubuntu1
eoan

not-affected

2.29-1ubuntu1
esm-infra-legacy/trusty

released

2.24-5ubuntu14.2+esm2
esm-infra/bionic

not-affected

2.29-1ubuntu1
esm-infra/focal

not-affected

2.29-1ubuntu1
esm-infra/xenial

released

2.26.1-1ubuntu1~16.04.8+esm1

Показывать по

EPSS

Процентиль: 86%
0.02696
Низкий

6.8 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 3.3
redhat
больше 8 лет назад

The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVSS3: 7.8
nvd
больше 8 лет назад

The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVSS3: 7.8
debian
больше 8 лет назад

The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU ...

CVSS3: 7.8
github
больше 3 лет назад

The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

suse-cvrf
больше 7 лет назад

Security update for binutils

EPSS

Процентиль: 86%
0.02696
Низкий

6.8 Medium

CVSS2

7.8 High

CVSS3