// For flags

CVE-2025-8224

GNU Binutils BFD Library elf.c bfd_elf_get_str_section null pointer dereference

Severity Score

4.8
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

4
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A vulnerability has been found in GNU Binutils 2.44 and classified as problematic. This vulnerability affects the function bfd_elf_get_str_section of the file bfd/elf.c of the component BFD Library. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The name of the patch is db856d41004301b3a56438efd957ef5cabb91530. It is recommended to apply a patch to fix this issue.

Se ha encontrado una vulnerabilidad en GNU Binutils 2.44, clasificada como problemática. Esta vulnerabilidad afecta a la función bfd_elf_get_str_section del archivo bfd/elf.c del componente BFD Library. La manipulación provoca la desreferencia de puntero nulo. Se requiere acceso local para abordar este ataque. Se ha hecho público el exploit y puede que sea utilizado. El parche se llama db856d41004301b3a56438efd957ef5cabb91530. Se recomienda aplicar un parche para solucionar este problema.

In GNU Binutils 2.44 wurde eine problematische Schwachstelle gefunden. Betroffen ist die Funktion bfd_elf_get_str_section der Datei bfd/elf.c der Komponente BFD Library. Dank der Manipulation mit unbekannten Daten kann eine null pointer dereference-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs hat dabei lokal zu erfolgen. Der Exploit steht zur öffentlichen Verfügung. Der Patch wird als db856d41004301b3a56438efd957ef5cabb91530 bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen.

This update for binutils fixes the following issues.

*Credits: arthurx
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Attack Requirements
None
Privileges Required
Low
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
None
None
Integrity
None
None
Availability
Low
None
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2025-07-26 CVE Reserved
  • 2025-07-27 CVE Published
  • 2025-08-01 CVE Updated
  • 2025-08-01 First Exploit
  • 2026-02-20 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-404: Improper Resource Shutdown or Release
  • CWE-476: NULL Pointer Dereference
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Gnu
Search vendor "Gnu"
Binutils
Search vendor "Gnu" for product "Binutils"
2.44
Search vendor "Gnu" for product "Binutils" and version "2.44"
-
Affected