Vulnerability Description
Buffer overflow in reset_vars in config/tc-crx.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050714 allows user-assisted attackers to have an unknown impact via a crafted .s file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Binutils | < 2.17 |
| Canonical | Ubuntu Linux | 5.10 |
References
- http://sources.redhat.com/bugzilla/show_bug.cgi?id=1069Issue TrackingPatchThird Party Advisory
- http://www.ubuntu.com/usn/usn-366-1Third Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44661Third Party AdvisoryVDB Entry
- http://sources.redhat.com/bugzilla/show_bug.cgi?id=1069Issue TrackingPatchThird Party Advisory
- http://www.ubuntu.com/usn/usn-366-1Third Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44661Third Party AdvisoryVDB Entry
FAQ
What is CVE-2005-4808?
CVE-2005-4808 is a vulnerability with a CVSS score of 7.6 (HIGH). Buffer overflow in reset_vars in config/tc-crx.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050714 allows user-assisted attackers to have an unknown impact via a c...
How severe is CVE-2005-4808?
CVE-2005-4808 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-4808?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Binutils, Canonical Ubuntu Linux.