Vulnerability Details : CVE-2018-7208
In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.
Vulnerability category: Memory CorruptionInput validationDenial of service
Products affected by CVE-2018-7208
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-7208
1.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-7208
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2018-7208
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-7208
-
http://www.securityfocus.com/bid/103077
GNU Binutils CVE-2018-7208 Remote Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHBA-2019:0327
RHBA-2019:0327 - Bug Fix Advisory - Red Hat Customer PortalThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
[security-announce] openSUSE-SU-2019:2415-1: moderate: Security update f
-
https://access.redhat.com/errata/RHSA-2018:3032
RHSA-2018:3032 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://sourceware.org/bugzilla/show_bug.cgi?id=22741
22741 – objcopy segfaultIssue Tracking;Third Party Advisory
-
https://security.gentoo.org/glsa/201811-17
Binutils: Multiple vulnerabilities (GLSA 201811-17) — Gentoo securityThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
[security-announce] openSUSE-SU-2019:2432-1: moderate: Security update f
Jump to