Vulnerability Description
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Binutils | 2.30 |
| Canonical | Ubuntu Linux | 16.04.4 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/104540Third Party AdvisoryVDB Entry
- https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102ExploitThird Party Advisory
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454ExploitIssue TrackingVendor Advisory
- https://security.gentoo.org/glsa/201908-01
- https://sourceware.org/bugzilla/show_bug.cgi?id=23057ExploitIssue TrackingThird Party Advisory
- https://usn.ubuntu.com/4336-1/
- http://www.securityfocus.com/bid/104540Third Party AdvisoryVDB Entry
- https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102ExploitThird Party Advisory
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454ExploitIssue TrackingVendor Advisory
- https://security.gentoo.org/glsa/201908-01
- https://sourceware.org/bugzilla/show_bug.cgi?id=23057ExploitIssue TrackingThird Party Advisory
- https://usn.ubuntu.com/4336-1/
FAQ
What is CVE-2018-12699?
CVE-2018-12699 is a vulnerability with a CVSS score of 9.8 (CRITICAL). finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds wr...
How severe is CVE-2018-12699?
CVE-2018-12699 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-12699?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Binutils, Canonical Ubuntu Linux.