Vulnerability Details : CVE-2018-6759
The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.
Vulnerability category: Memory CorruptionInput validationDenial of service
Products affected by CVE-2018-6759
- cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-6759
0.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 51 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-6759
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2018-6759
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-6759
-
http://www.securityfocus.com/bid/103030
GNU Binutils CVE-2018-6759 Remote Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
https://sourceware.org/bugzilla/show_bug.cgi?id=22794
22794 – Unchecked strnlen operation in bfd_get_debug_link_info_1 (./src/bfd/opncls.c)Issue Tracking;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
[security-announce] openSUSE-SU-2019:2415-1: moderate: Security update f
-
https://security.gentoo.org/glsa/201811-17
Binutils: Multiple vulnerabilities (GLSA 201811-17) — Gentoo securityThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
[security-announce] openSUSE-SU-2019:2432-1: moderate: Security update f
Jump to