Vulnerability Details : CVE-2006-2362
Buffer overflow in getsym in tekhex.c in libbfd in Free Software Foundation GNU Binutils before 20060423, as used by GNU strings, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a file with a crafted Tektronix Hex Format (TekHex) record in which the length character is not a valid hexadecimal character.
Vulnerability category: OverflowMemory CorruptionExecute codeDenial of service
Products affected by CVE-2006-2362
- cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-2362
1.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-2362
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2006-2362
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-2362
-
http://www.mail-archive.com/bug-binutils%40gnu.org/msg01516.html
[Bug binutils/2584] New: SIGSEGV in strings tool when the file is crafted.Issue Tracking;Mailing List
-
http://www.trustix.org/errata/2006/0034/
Trustix | Empowering Trust and Security in the Digital AgeBroken Link
-
http://lists.apple.com/archives/security-announce/2007/Oct/msg00001.html
Mailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/17950
Exploit;Patch;Third Party Advisory;VDB Entry
-
http://secunia.com/advisories/20550
About Secunia Research | FlexeraThird Party Advisory
-
http://secunia.com/advisories/20531
About Secunia Research | FlexeraThird Party Advisory
-
http://www.novell.com/linux/security/advisories/2006_26_sr.html
Security - Support | SUSEThird Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/26644
GNU Binutils libbfd buffer overflow CVE-2006-2362 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://www.ubuntu.com/usn/usn-292-1
USN-292-1: binutils vulnerability | Ubuntu security notices | UbuntuBroken Link
-
http://www.securitytracker.com/id?1018872
GoDaddy Domain Name SearchThird Party Advisory;VDB Entry
-
http://secunia.com/advisories/27441
About Secunia Research | FlexeraThird Party Advisory
-
http://www.vupen.com/english/advisories/2006/1924
Webmail: access your OVH emails on ovhcloud.com | OVHcloudPermissions Required
-
http://www.vupen.com/english/advisories/2007/3665
Webmail: access your OVH emails on ovhcloud.com | OVHcloudPermissions Required
-
http://secunia.com/advisories/20188
About Secunia Research | FlexeraThird Party Advisory
-
http://sourceware.org/bugzilla/show_bug.cgi?id=2584
2584 – SIGSEGV in strings tool when the file is crafted.Exploit;Issue Tracking;Third Party Advisory
-
http://secunia.com/advisories/22932
About Secunia Research | FlexeraThird Party Advisory
-
http://www.mail-archive.com/bug-binutils@gnu.org/msg01516.html
Exploit;Third Party Advisory
Jump to