SB2014041105 - Heap-based buffer overflow in Sourceware elfutils 



SB2014041105 - Heap-based buffer overflow in Sourceware elfutils

Published: April 11, 2014 Updated: August 10, 2020

Security Bulletin ID SB2014041105
Severity
Medium
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Heap-based buffer overflow (CVE-ID: CVE-2014-0172)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158. A remote attacker can use a malformed compressed debug section in an ELF file to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.