CVE-2017-16830

The print_gnu_property_note function in readelf.c in GNU Binutils 2.29.1 does not have integer-overflow protection on 32-bit platforms, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted ELF file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*

History

21 Nov 2024, 03:17

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/101941 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/101941 - Third Party Advisory, VDB Entry
References () https://security.gentoo.org/glsa/201811-17 - () https://security.gentoo.org/glsa/201811-17 -
References () https://sourceware.org/bugzilla/show_bug.cgi?id=22384 - Exploit, Issue Tracking, Patch () https://sourceware.org/bugzilla/show_bug.cgi?id=22384 - Exploit, Issue Tracking, Patch
References () https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4 - () https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4 -

07 Nov 2023, 02:40

Type Values Removed Values Added
References
  • {'url': 'https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4', 'name': 'https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4', 'tags': ['Patch'], 'refsource': 'CONFIRM'}
  • () https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4 -

Information

Published : 2017-11-15 08:29

Updated : 2024-11-21 03:17


NVD link : CVE-2017-16830

Mitre link : CVE-2017-16830

CVE.ORG link : CVE-2017-16830


JSON object : View

Products Affected

gnu

  • binutils
CWE
CWE-190

Integer Overflow or Wraparound