CVE-2017-7613

elflint.c in elfutils 0.168 does not validate the number of sections and the number of segments, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:elfutils_project:elfutils:0.168:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 03:32

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html - () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html -
References () https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c - Exploit, Patch, Third Party Advisory () https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c - Exploit, Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html - Third Party Advisory
References () https://security.gentoo.org/glsa/201710-10 - Third Party Advisory () https://security.gentoo.org/glsa/201710-10 - Third Party Advisory
References () https://usn.ubuntu.com/3670-1/ - Third Party Advisory () https://usn.ubuntu.com/3670-1/ - Third Party Advisory

Information

Published : 2017-04-09 14:59

Updated : 2024-11-21 03:32


NVD link : CVE-2017-7613

Mitre link : CVE-2017-7613

CVE.ORG link : CVE-2017-7613


JSON object : View

Products Affected

debian

  • debian_linux

elfutils_project

  • elfutils

canonical

  • ubuntu_linux
CWE
CWE-20

Improper Input Validation