Vulnerability Details : CVE-2017-9750
opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2017-9750
Probability of exploitation activity in the next 30 days: 2.73%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 89 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2017-9750
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2017-9750
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-9750
-
https://sourceware.org/bugzilla/show_bug.cgi?id=21587
21587 – global-buffer-overflow in rx_decode_opcodeIssue Tracking;Patch;Third Party Advisory
-
https://www.exploit-db.com/exploits/42198/
GNU binutils - 'rx_decode_opcode' Buffer Overflow
-
http://www.securityfocus.com/bid/99118
GNU Binutils CVE-2017-9750 Remote Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
https://security.gentoo.org/glsa/201801-01
Binutils: Multiple vulnerabilities (GLSA 201801-01) — Gentoo security
Products affected by CVE-2017-9750
- cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*