Out-of-Bounds Affecting binutils package, versions *
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-BINUTILS-1977089
- published 26 Jul 2021
- disclosed 27 Oct 2017
Introduced: 27 Oct 2017
CVE-2017-15996 Open this link in a new tabHow to fix?
There is no fixed version for Centos:7
binutils
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils
package and not the binutils
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
elfcomm.c in readelf in GNU Binutils 2.29 allows remote attackers to cause a denial of service (excessive memory allocation) or possibly have unspecified other impact via a crafted ELF file that triggers a "buffer overflow on fuzzed archive header," related to an uninitialized variable, an improper conditional jump, and the get_archive_member_name, process_archive_index_and_symbols, and setup_archive functions.
References
- http://www.securityfocus.com/bid/101608
- https://sourceware.org/bugzilla/show_bug.cgi?id=22361
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d91f0b20e561e326ee91a09a76206257bde8438b
- https://access.redhat.com/security/cve/CVE-2017-15996
- https://security.gentoo.org/glsa/201801-01
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d91f0b20e561e326ee91a09a76206257bde8438b