Ubuntu update for binutils



Risk Medium
Patch available YES
Number of vulnerabilities 6
CVE-ID CVE-2022-44840
CVE-2022-45703
CVE-2022-47007
CVE-2022-47008
CVE-2022-47010
CVE-2022-47011
CWE-ID CWE-122
CWE-401
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Ubuntu
Operating systems & Components / Operating system

binutils-multiarch (Ubuntu package)
Operating systems & Components / Operating system package or component

binutils (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 6 vulnerabilities.

1) Heap-based buffer overflow

EUVDB-ID: #VU85404

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-44840

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the find_section_in_set() function in readelf.c. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package binutils to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

binutils-multiarch (Ubuntu package): before 2.38-4ubuntu2.5

binutils (Ubuntu package): before 2.38-4ubuntu2.5

CPE2.3 External links

http://ubuntu.com/security/notices/USN-6581-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Heap-based buffer overflow

EUVDB-ID: #VU85405

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-45703

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the display_debug_section() function in readelf.c. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package binutils to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

binutils-multiarch (Ubuntu package): before 2.38-4ubuntu2.5

binutils (Ubuntu package): before 2.38-4ubuntu2.5

CPE2.3 External links

http://ubuntu.com/security/notices/USN-6581-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Memory leak

EUVDB-ID: #VU83859

Risk: Low

CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-47007

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak within the stab_demangle_v3_arg() function in stabs.c. A remote attacker can force the application to leak memory and perform denial of service attack.

Mitigation

Update the affected package binutils to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

binutils-multiarch (Ubuntu package): before 2.38-4ubuntu2.5

binutils (Ubuntu package): before 2.38-4ubuntu2.5

CPE2.3 External links

http://ubuntu.com/security/notices/USN-6581-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Memory leak

EUVDB-ID: #VU83860

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-47008

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak within the make_tempdir() and make_tempname() function in bucomm.c. A remote attacker can trick the victim to pass specially crafted data to the application and and perform denial of service attack.

Mitigation

Update the affected package binutils to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

binutils-multiarch (Ubuntu package): before 2.38-4ubuntu2.5

binutils (Ubuntu package): before 2.38-4ubuntu2.5

CPE2.3 External links

http://ubuntu.com/security/notices/USN-6581-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Memory leak

EUVDB-ID: #VU83861

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-47010

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak within the pr_function_type(0 function in prdbg.c. A remote attacker can trick the victim to pass specially crafted input to the application and perform denial of service attack.

Mitigation

Update the affected package binutils to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

binutils-multiarch (Ubuntu package): before 2.38-4ubuntu2.5

binutils (Ubuntu package): before 2.38-4ubuntu2.5

CPE2.3 External links

http://ubuntu.com/security/notices/USN-6581-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Memory leak

EUVDB-ID: #VU83862

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-47011

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak within the parse_stab_struct_fields() function in stabs.c. A remote attacker can trick the victim to pass specially crafted input to the application and perform denial of service attack.

Mitigation

Update the affected package binutils to the latest version.

Vulnerable software versions

Ubuntu: 20.04 - 22.04

binutils-multiarch (Ubuntu package): before 2.38-4ubuntu2.5

binutils (Ubuntu package): before 2.38-4ubuntu2.5

CPE2.3 External links

http://ubuntu.com/security/notices/USN-6581-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###