Vulnerability Description
GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to the byte_get_little_endian function in elfcomm.c, the get_unwind_section_word function in readelf.c, and ARM unwind information that contains invalid word offsets.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Binutils | 2.28 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/98589
- https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/PatchThird Party AdvisoryVDB Entry
- https://security.gentoo.org/glsa/201709-02
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=f32ba72991d2406b21a
- http://www.securityfocus.com/bid/98589
- https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/PatchThird Party AdvisoryVDB Entry
- https://security.gentoo.org/glsa/201709-02
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=f32ba72991d2406b21a
FAQ
What is CVE-2017-9038?
CVE-2017-9038 is a vulnerability with a CVSS score of 5.5 (MEDIUM). GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to the byte_get_little_endian function in elf...
How severe is CVE-2017-9038?
CVE-2017-9038 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-9038?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Binutils.