CVE-2018-10535

The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a "SECTION" type that has a "0" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:41

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/104021 - VDB Entry, Third Party Advisory () http://www.securityfocus.com/bid/104021 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHBA-2019:0327 - Third Party Advisory () https://access.redhat.com/errata/RHBA-2019:0327 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3032 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3032 - Third Party Advisory
References () https://security.gentoo.org/glsa/201908-01 - () https://security.gentoo.org/glsa/201908-01 -
References () https://sourceware.org/bugzilla/show_bug.cgi?id=23113 - Issue Tracking, Third Party Advisory () https://sourceware.org/bugzilla/show_bug.cgi?id=23113 - Issue Tracking, Third Party Advisory
References () https://usn.ubuntu.com/4336-1/ - () https://usn.ubuntu.com/4336-1/ -

Information

Published : 2018-04-29 15:29

Updated : 2024-11-21 03:41


NVD link : CVE-2018-10535

Mitre link : CVE-2018-10535

CVE.ORG link : CVE-2018-10535


JSON object : View

Products Affected

gnu

  • binutils

redhat

  • enterprise_linux_desktop
  • enterprise_linux_server
  • enterprise_linux_workstation
CWE
CWE-476

NULL Pointer Dereference