CVE-2025-1372
GNU elfutils eu-readelf readelf.c print_string_section buffer overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability was found in GNU elfutils 0.192. It has been declared as critical. Affected by this vulnerability is the function dump_data_section/print_string_section of the file readelf.c of the component eu-readelf. The manipulation of the argument z/x leads to buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 73db9d2021cab9e23fd734b0a76a612d52a6f1db. It is recommended to apply a patch to fix this issue.
In GNU elfutils 0.192 wurde eine kritische Schwachstelle ausgemacht. Das betrifft die Funktion dump_data_section/print_string_section der Datei readelf.c der Komponente eu-readelf. Durch Manipulation des Arguments z/x mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff muss lokal angegangen werden. Der Exploit steht zur öffentlichen Verfügung. Der Patch wird als 73db9d2021cab9e23fd734b0a76a612d52a6f1db bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2025-02-16 CVE Reserved
- 2025-02-17 CVE Published
- 2025-02-17 EPSS Updated
- 2025-02-18 CVE Updated
- 2025-02-18 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://sourceware.org/bugzilla/show_bug.cgi?id=32656 | Issue Tracking | |
https://sourceware.org/bugzilla/show_bug.cgi?id=32657 | Issue Tracking | |
https://vuldb.com/?id.295981 | Technical Description | |
https://vuldb.com/?submit.496485 | Third Party Advisory | |
https://www.gnu.org | Product |
URL | Date | SRC |
---|---|---|
https://sourceware.org/bugzilla/attachment.cgi?id=15927 | 2025-02-18 |
URL | Date | SRC |
---|---|---|
https://sourceware.org/bugzilla/show_bug.cgi?id=32656#c3 | 2025-02-17 |
URL | Date | SRC |
---|