Page 2 of 10 results (0.006 seconds)

CVSS: 4.4EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in the do_type function in cplus-dem.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary. Desbordamiento de búfer en la función do_type en cplus-dem.c en libiberty permite a atacantes remotos provocar una denegación de servicio (error de segmentación y caída) a través de un binario manipulado. • http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The demangle_template_value_parm and do_hpacc_template_literal functions in cplus-dem.c in libiberty allow remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted binary. Las funciones demangle_template_value_parm y do_hpacc_template_literal en cplus-dem.c en libiberty permiten a atacantes remotos provocar una denegación de servicio (lectura fuera de límites y caída) a través de un binario manipulado. • http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 2%CPEs: 1EXPL: 1

Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow. Desbordamiento de entero en la función string_appends en cplus-dem.c en libiberty permite a atacantes remotos ejecutar código arbitrario a través de un ejecutable manipulado, que desencadena un desbordamiento de búfer. GNU libiberty suffers from a buffer overflow vulnerability. • https://www.exploit-db.com/exploits/42386 http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90103 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-190: Integer Overflow or Wraparound •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The demangler in GNU Libiberty allows remote attackers to cause a denial of service (infinite loop, stack overflow, and crash) via a cycle in the references of remembered mangled types. El demangler en GNU Libiberty permite a atacantes remotos provocar una denegación de servicio (bucle infinito, desbordamiento de pila y caída) a través de un ciclo en las referencias de tipos destrozados recordados. • http://www.openwall.com/lists/oss-security/2016/06/30/4 http://www.openwall.com/lists/oss-security/2016/06/30/7 http://www.securityfocus.com/bid/91519 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=71696 https://gcc.gnu.org/ml/gcc-patches/2016-06/msg02030.html • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 2%CPEs: 7EXPL: 0

Multiple integer overflows in the (1) _objalloc_alloc function in objalloc.c and (2) objalloc_alloc macro in include/objalloc.h in GNU libiberty, as used by binutils 2.22, allow remote attackers to cause a denial of service (crash) via vectors related to the "addition of CHUNK_HEADER_SIZE to the length," which triggers a heap-based buffer overflow. Varias vulnerabilidades de desbordamiento de enteros en la función _objalloc_alloc (1) en objalloc.c y (2) macro objalloc_alloc en include/objalloc.h en GNU libiberty, utilizada por binutils v2.22, permite a atacantes remotos provocar una denegación de servicio (caída) a través de vectores relacionada con la "adición de CHUNK_HEADER_SIZE a la longitud", lo que provoca un desbordamiento de búfer basado en heap • http://gcc.gnu.org/bugzilla/show_bug.cgi?id=54411 http://gcc.gnu.org/ml/gcc-patches/2012-08/msg01986.html http://security-tracker.debian.org/tracker/CVE-2012-3509 http://www.mandriva.com/security/advisories?name=MDVSA-2015:029 http://www.openwall.com/lists/oss-security/2012/08/29/3 http://www.securityfocus.com/bid/55281 http://www.ubuntu.com/usn/USN-2496-1 https://exchange.xforce.ibmcloud.com/vulnerabilities/78135 • CWE-189: Numeric Errors •