Vulnerability Details : CVE-2017-17124
Potential exploit
The _bfd_coff_read_string_table function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not properly validate the size of the external string table, which allows remote attackers to cause a denial of service (excessive memory consumption, or heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted COFF binary.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2017-17124
- cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-17124
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 33 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-17124
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2017-17124
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-17124
-
https://security.gentoo.org/glsa/201811-17
Binutils: Multiple vulnerabilities (GLSA 201811-17) — Gentoo security
-
https://sourceware.org/bugzilla/show_bug.cgi?id=22507
22507 – Heap buffer overflow on _bfd_coff_read_string_tableExploit;Issue Tracking
-
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b0029dce6867de1a2828293177b0e030d2f0f03c
sourceware.org Git - binutils-gdb.git/commitPatch
Jump to