Page 7 of 89 results (0.063 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

18 May 2017 — GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to the byte_get_little_endian function in elfcomm.c, the get_unwind_section_word function in readelf.c, and ARM unwind information that contains invalid word offsets. GNU Binutils 2.28 permite que atacantes remotos provoquen una denegación de servicio (sobrelectura de búfer basado en memoria dinámica o heap y cierre inesperado de la aplicación) mediante u... • http://www.securityfocus.com/bid/98589 • CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

18 May 2017 — GNU Binutils 2.28 allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file with many program headers, related to the get_program_headers function in readelf.c. GNU Binutils 2.28 permite que atacantes remotos provoquen una denegación de servicio (consumo de memoria) mediante un archivo ELF manipulado con múltiples cabeceras de programa. Esto está relacionado con la función get_program_headers en readelf.c. USN-4336-1 fixed several vulnerabilities in GNU binutils. This ... • http://www.securityfocus.com/bid/98580 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

18 May 2017 — readelf.c in GNU Binutils 2017-04-12 has a "cannot be represented in type long" issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file. readelf.c en GNU Binutils 2017-04-12 tiene un problema de tipo "cannot be represented in type long" (no puede ser representado en type long), lo que puede permitir que atacantes remotos provoquen una denegación de servicio (cierre inesperado de la aplicación) o, probablement... • https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes • CWE-704: Incorrect Type Conversion or Cast •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

18 May 2017 — readelf.c in GNU Binutils 2017-04-12 has a "shift exponent too large for type unsigned long" issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file. Se presenta una vulnerabilidad en el archivo readelf.c en GNU Binutils el 12-04-2017, presenta un problema de "shift exponent too large for type unsigned long", que podría permitir a los atacantes remotos causar una denegación de servicio (bloqueo de aplicación)... • http://www.securityfocus.com/bid/98591 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

02 May 2017 — The function coff_set_alignment_hook in coffcode.h in Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a memory leak vulnerability which can cause memory exhaustion in objdump via a crafted PE file. Additional validation in dump_relocs_in_section in objdump.c can resolve this. La función coff_set_alignment_hook de coffcode.h en la biblioteca Binary File Descriptor (BFD) (también conocida como libbfd), tal como se distribuye en GNU Binutils 2.28, presenta una vulner... • https://security.gentoo.org/glsa/201709-02 • CWE-772: Missing Release of Resource after Effective Lifetime •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

01 May 2017 — The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 because the existing reloc offset range tests didn't catch small negative offsets less than the size of the reloc field. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash. La librería Binary File Descriptor (BFD) (también conocida como libbfd), tal como se distribuye en GNU Binutils 2.28, es vul... • https://security.gentoo.org/glsa/201709-02 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

01 May 2017 — dwarf.c in GNU Binutils 2.28 is vulnerable to an invalid read of size 1 during dumping of debug information from a corrupt binary. This vulnerability causes programs that conduct an analysis of binary programs, such as objdump and readelf, to crash. dwarf.c en GNU Binutils 2.28 es vulnerable a una lectura no válida de tamaño 1 durante el volcado de información de debug de un binario corrupto. Esta vulnerabilidad provoca la caída del servicio en programas que analizan binarios, como objcopy y readelf. USN-43... • https://security.gentoo.org/glsa/201709-02 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

01 May 2017 — The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of _bfd_elf_large_com_section. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash. La biblioteca Binary File Descriptor (BFD) (también conocida como libbfd), tal como se distribuye en GNU Binutils 2.28, es vulnerable a una lectura no válida de tamaño 4 referencia... • https://security.gentoo.org/glsa/201709-02 • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

01 May 2017 — The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash. La biblioteca Binary File Descriptor (BFD) (también conocida como libbfd), tal como se distribuye en GNU Binutils 2.28, es vulnerable... • https://security.gentoo.org/glsa/201709-02 • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

01 May 2017 — The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a global buffer over-read error because of an assumption made by code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always named starting with a .rel/.rela prefix. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy and strip, to crash. La biblioteca Binary File Descriptor (BFD) (también conocida como libbfd), ... • https://security.gentoo.org/glsa/201709-02 • CWE-125: Out-of-bounds Read •