The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file.
References
Link | Resource |
---|---|
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0bb6961f18b8e832d88b490d421ca56cea16c45b | Patch |
https://sourceware.org/bugzilla/show_bug.cgi?id=22373 | Exploit Issue Tracking Patch |
https://security.gentoo.org/glsa/201811-17 |
Configurations
Information
Published : 2017-11-15 00:29
Updated : 2018-11-27 03:29
NVD link : CVE-2017-16832
Mitre link : CVE-2017-16832
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
gnu
- binutils