SB2025021209 - Multiple vulnerabilities in GNU Binutils



SB2025021209 - Multiple vulnerabilities in GNU Binutils

Published: February 12, 2025 Updated: April 8, 2025

Security Bulletin ID SB2025021209
Severity
High
Patch available
YES
Number of vulnerabilities 14
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 64% Low 36%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 14 secuirty vulnerabilities.


1) Stack-based buffer overflow (CVE-ID: CVE-2025-0840)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the disassemble_bytes() function in binutils/objdump.c within the nm binary. A remote attacker can pass specially crafted input to the application, trigger a stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Buffer overflow (CVE-ID: CVE-2024-57360)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when handling files within the nm binary. A remote attacker can pass specially crafted input to the application, trigger memory corruption and execute arbitrary code on the target system.



3) Heap-based buffer overflow (CVE-ID: CVE-2025-1176)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the _bfd_elf_gc_mark_rsec() function in bfd/elflink.c within the ld binary. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.


4) Buffer overflow (CVE-ID: CVE-2025-1182)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the bfd_elf_reloc_symbol_deleted_p() function in bfd/elflink.c within the ld binary. A remote attacker can pass specially crafted input to the binary, trigger memory corruption and execute arbitrary code on the target system.


5) Buffer overflow (CVE-ID: CVE-2025-1181)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the _bfd_elf_gc_mark_rsec() function in bfd/elflink.c within the ld binary. A remote attacker can pass specially crafted input to the binary, trigger memory corruption and execute arbitrary code on the target system.


6) Buffer overflow (CVE-ID: CVE-2025-1178)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the bfd_putl64() function in libbfd.c. A remote attacker can pass specially crafted input to the application, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


7) Buffer overflow (CVE-ID: CVE-2025-1147)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the __sanitizer::internal_strlen() function in binutils/nm.c. A remote attacker can pass specially crafted input to the application, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


8) Buffer overflow (CVE-ID: CVE-2025-1179)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the bfd_putl64() function in bfd/libbfd.c. A remote attacker can pass specially crafted input to the application, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


9) Buffer overflow (CVE-ID: CVE-2025-1180)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the _bfd_elf_write_section_eh_frame() function in bfd/elf-eh-frame.c. A remote attacker can pass specially crafted input to the application, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


10) Memory leak (CVE-ID: CVE-2025-1152)

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak within the xstrdup() function in xstrdup.c. A remote attacker can force the application to leak memory and perform denial of service attack.


11) Memory leak (CVE-ID: CVE-2025-1150)

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak within the bfd_malloc() function in libbfd.c. A remote attacker can force the application to leak memory and perform denial of service attack.


12) Memory leak (CVE-ID: CVE-2025-1151)

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak within the xmemdup() function in xmemdup.c. A remote attacker can force the application to leak memory and perform denial of service attack.


13) Memory leak (CVE-ID: CVE-2025-1149)

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak within the xstrdup() function in libiberty/xmalloc.c. A remote attacker can force the application to leak memory and perform denial of service attack.


14) Memory leak (CVE-ID: CVE-2025-1148)

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak within the link_order_scan() function in ld/ldelfgen.c. A remote attacker can force the application to leak memory and perform denial of service attack.


Remediation

Install update from vendor's website.

References