(1) libdwarf/dwarf_leb.c and (2) dwarfdump/print_frames.c in libdwarf before 20161124 allow remote attackers to have unspecified impact via a crafted bit pattern in a signed leb number, aka a "negation overflow."
References
Configurations
History
21 Nov 2024, 03:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2016/11/19/6 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/11/23/3 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/94491 - Third Party Advisory, VDB Entry | |
References | () https://blogs.gentoo.org/ago/2016/11/19/libdwarf-negation-overflow-in-dwarf_leb-c/ - Exploit, Patch, Third Party Advisory, VDB Entry | |
References | () https://sourceforge.net/p/libdwarf/code/ci/4f19e1050cd8e9ddf2cb6caa061ff2fec4c9b5f9/#diff-5 - Third Party Advisory | |
References | () https://www.prevanders.net/dwarfbug.html - Third Party Advisory |
Information
Published : 2017-02-28 18:59
Updated : 2024-11-21 03:01
NVD link : CVE-2016-9558
Mitre link : CVE-2016-9558
CVE.ORG link : CVE-2016-9558
JSON object : View
Products Affected
libdwarf_project
- libdwarf
CWE
CWE-190
Integer Overflow or Wraparound