(1) libdwarf/dwarf_leb.c and (2) dwarfdump/print_frames.c in libdwarf before 20161124 allow remote attackers to have unspecified impact via a crafted bit pattern in a signed leb number, aka a "negation overflow."
References
Link | Resource |
---|---|
https://www.prevanders.net/dwarfbug.html | Third Party Advisory |
https://sourceforge.net/p/libdwarf/code/ci/4f19e1050cd8e9ddf2cb6caa061ff2fec4c9b5f9/#diff-5 | Third Party Advisory |
https://blogs.gentoo.org/ago/2016/11/19/libdwarf-negation-overflow-in-dwarf_leb-c/ | Exploit Patch Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/94491 | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2016/11/23/3 | Mailing List Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/11/19/6 | Mailing List Patch Third Party Advisory |
Configurations
Information
Published : 2017-02-28 10:59
Updated : 2022-03-01 11:13
NVD link : CVE-2016-9558
Mitre link : CVE-2016-9558
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
libdwarf_project
- libdwarf