Multiple vulnerabilities in GNU Binutils



Risk Low
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2022-47011
CVE-2022-47010
CVE-2022-47008
CVE-2022-47007
CVE-2022-35205
CWE-ID CWE-401
CWE-617
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Binutils
Universal components / Libraries / Libraries used by multiple products

Vendor GNU

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Memory leak

EUVDB-ID: #VU83862

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-47011

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak within the parse_stab_struct_fields() function in stabs.c. A remote attacker can trick the victim to pass specially crafted input to the application and perform denial of service attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Binutils: 2.34 - 2.38

CPE2.3 External links

http://sourceware.org/bugzilla/show_bug.cgi?id=29261


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Memory leak

EUVDB-ID: #VU83861

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-47010

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak within the pr_function_type(0 function in prdbg.c. A remote attacker can trick the victim to pass specially crafted input to the application and perform denial of service attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Binutils: 2.34 - 2.38

CPE2.3 External links

http://sourceware.org/bugzilla/show_bug.cgi?id=29262


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Memory leak

EUVDB-ID: #VU83860

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-47008

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak within the make_tempdir() and make_tempname() function in bucomm.c. A remote attacker can trick the victim to pass specially crafted data to the application and and perform denial of service attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Binutils: 2.34 - 2.38

CPE2.3 External links

http://sourceware.org/bugzilla/show_bug.cgi?id=29255%20


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Memory leak

EUVDB-ID: #VU83859

Risk: Low

CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-47007

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak within the stab_demangle_v3_arg() function in stabs.c. A remote attacker can force the application to leak memory and perform denial of service attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Binutils: 2.34 - 2.38

CPE2.3 External links

http://sourceware.org/bugzilla/show_bug.cgi?id=29254


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Reachable Assertion

EUVDB-ID: #VU83858

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-35205

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion within the display_debug_names() function. A remote attacker can trick the victim to pass specially crafted input to the application and crash it.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Binutils: 2.38

CPE2.3 External links

http://sourceware.org/bugzilla/show_bug.cgi?id=29289
http://security.netapp.com/advisory/ntap-20231006-0010/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###