CVE-2014-8504
Published: 9 December 2014
Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted file.
Notes
Author | Note |
---|---|
sbeattie | buffer overflow is caught by fortify source, so DoS only |
Priority
Status
Package | Release | Status |
---|---|---|
binutils Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
lucid |
Released
(2.20.1-3ubuntu7.2)
|
|
precise |
Released
(2.22-6ubuntu1.2)
|
|
trusty |
Released
(2.24-5ubuntu3.1)
|
|
utopic |
Released
(2.24.90.20141014-0ubuntu3.1)
|
|
Patches: upstream: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=708d7d0d11f0f2d776171979aa3479e8e12a38a0 |
||
This vulnerability is mitigated in part by the use of -D_FORTIFY_SOURCE=2 in Ubuntu. |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8504
- http://openwall.com/lists/oss-security/2014/10/27/4
- http://openwall.com/lists/oss-security/2014/10/27/5
- http://www.openwall.com/lists/oss-security/2014/10/31
- https://ubuntu.com/security/notices/USN-2496-1
- NVD
- Launchpad
- Debian