Vulnerability Details : CVE-2017-15996
elfcomm.c in readelf in GNU Binutils 2.29 allows remote attackers to cause a denial of service (excessive memory allocation) or possibly have unspecified other impact via a crafted ELF file that triggers a "buffer overflow on fuzzed archive header," related to an uninitialized variable, an improper conditional jump, and the get_archive_member_name, process_archive_index_and_symbols, and setup_archive functions.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2017-15996
- cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-15996
0.33%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-15996
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2017-15996
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-15996
-
http://www.securityfocus.com/bid/101608
GNU Binutils CVE-2017-15996 Multiple Denial of Service VulnerabilitiesThird Party Advisory;VDB Entry
-
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d91f0b20e561e326ee91a09a76206257bde8438b
sourceware.org Git - binutils-gdb.git/commitIssue Tracking;Patch;Third Party Advisory
-
https://sourceware.org/bugzilla/show_bug.cgi?id=22361
22361 – Memory Allocation Error stemming from a Conditional jump dependant on an uninitialized value in process_archive (within readelf.c)Issue Tracking;Patch;Third Party Advisory
-
https://security.gentoo.org/glsa/201801-01
Binutils: Multiple vulnerabilities (GLSA 201801-01) — Gentoo security
Jump to