The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, do not ensure a unique PLT entry for a symbol, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.
References
Link | Resource |
---|---|
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=61e3bf5f83f7e505b6bc51ef65426e5b31e6e360 | Issue Tracking Patch Third Party Advisory |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=56933f9e3e90eebf1018ed7417d6c1184b91db6b | Issue Tracking Patch Third Party Advisory |
https://sourceware.org/bugzilla/show_bug.cgi?id=22170 | Issue Tracking Patch Third Party Advisory |
https://blogs.gentoo.org/ago/2017/09/25/binutils-heap-based-buffer-overflow-in-_bfd_x86_elf_get_synthetic_symtab-elfxx-x86-c/ | Patch Third Party Advisory VDB Entry |
Configurations
Information
Published : 2017-09-25 09:29
Updated : 2017-09-28 09:51
NVD link : CVE-2017-14729
Mitre link : CVE-2017-14729
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
gnu
- binutils