CVE-2017-7226
Published: 22 March 2017
The pe_ILF_object_p function in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a heap-based buffer over-read of size 4049 because it uses the strlen function instead of strnlen, leading to program crashes in several utilities such as addr2line, size, and strings. It could lead to information disclosure as well.
Priority
Status
Package | Release | Status |
---|---|---|
binutils Launchpad, Ubuntu, Debian |
artful |
Ignored
(end of life)
|
bionic |
Not vulnerable
(2.30-21ubuntu1~18.04.1)
|
|
cosmic |
Not vulnerable
(2.31.1-6ubuntu1.1)
|
|
disco |
Not vulnerable
(2.32-7ubuntu4)
|
|
eoan |
Not vulnerable
(2.32-8ubuntu1)
|
|
focal |
Not vulnerable
(2.32-8ubuntu1)
|
|
groovy |
Not vulnerable
(2.32-8ubuntu1)
|
|
hirsute |
Not vulnerable
(2.32-8ubuntu1)
|
|
impish |
Not vulnerable
(2.32-8ubuntu1)
|
|
jammy |
Not vulnerable
(2.32-8ubuntu1)
|
|
kinetic |
Not vulnerable
(2.32-8ubuntu1)
|
|
lunar |
Not vulnerable
(2.32-8ubuntu1)
|
|
mantic |
Not vulnerable
(2.32-8ubuntu1)
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Needed
|
|
upstream |
Released
(2.27.51.20161212-1)
|
|
xenial |
Released
(2.26.1-1ubuntu1~16.04.8+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Ignored
(end of life)
|
|
Patches: upstream: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=fa6631b4eecfcca00c13b9594e6336dffd40982f |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.1 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |