CVE-2017-13757
Published: 29 August 2017
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not validate the PLT section size, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to elf_i386_get_synthetic_symtab in elf32-i386.c and elf_x86_64_get_synthetic_symtab in elf64-x86-64.c.
Notes
Author | Note |
---|---|
sbeattie | re-check to verify elf_i386_plt_sym_val() in older releases |
Priority
Status
Package | Release | Status |
---|---|---|
binutils Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(2.29.1-1ubuntu1)
|
bionic |
Not vulnerable
(2.29.1-1ubuntu1)
|
|
cosmic |
Not vulnerable
(2.29.1-1ubuntu1)
|
|
disco |
Not vulnerable
(2.29.1-1ubuntu1)
|
|
eoan |
Not vulnerable
(2.29.1-1ubuntu1)
|
|
trusty |
Not vulnerable
(code not present)
|
|
upstream |
Released
(2.29.1)
|
|
xenial |
Not vulnerable
(code not present)
|
|
zesty |
Ignored
(end of life)
|
|
Patches: upstream: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=patch;h=90efb6422939ca031804266fba669f77c22a274a upstream: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=patch;h=bb0216e26681531bf967a6a3f1800789ade3693d |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |