Vulnerability Details : CVE-2025-0840
A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.
Vulnerability category: Overflow
Products affected by CVE-2025-0840
- cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2025-0840
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 24 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2025-0840
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
VulDB | 2025-01-29 |
5.0
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L |
1.6
|
3.4
|
VulDB | 2025-01-29 |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.6
|
5.9
|
NIST | 2025-03-04 |
6.3
|
MEDIUM | CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/V... |
N/A
|
N/A
|
VulDB | 2025-01-29 |
CWE ids for CVE-2025-0840
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: cna@vuldb.com (Primary)
-
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).Assigned by: cna@vuldb.com (Primary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Secondary)
References for CVE-2025-0840
-
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=baac6c221e9d69335bf41366a1c7d87d8ab2f893
sourceware.org Git - binutils-gdb.git/commitPatch
-
https://www.gnu.org/
The GNU Operating System and the Free Software MovementProduct
-
https://sourceware.org/bugzilla/show_bug.cgi?id=32560
32560 – stack-buffer-overflow at objdump disassemble_bytes (objdump.c:3543:34)Exploit;Issue Tracking
-
https://sourceware.org/bugzilla/attachment.cgi?id=15882
Broken Link
-
https://vuldb.com/?id.293997
CVE-2025-0840 GNU Binutils objdump.c disassemble_bytes stack-based overflowThird Party Advisory;VDB Entry
-
https://vuldb.com/?ctiid.293997
Permissions Required;VDB Entry
-
https://vuldb.com/?submit.485255
Exploit;Third Party Advisory;VDB Entry
Jump to