Vulnerability identifier: #VU17102
Vulnerability risk: Low
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-20712
CWE-ID:
CWE-125
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Binutils
Universal components / Libraries /
Libraries used by multiple products
Vendor: GNU
Description
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a heap-based buffer over-read in the function d_expression_1 in cp-demangle.c in GNU libiberty. A remote attacker can pass specially crafted data to the application, trigger segmentation faults and read contents of memory on the system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Binutils: 2.31.1
External links
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.