#VU39450 Out-of-bounds read in Binutils - CVE-2017-6969


| Updated: 2020-08-08

Vulnerability identifier: #VU39450

Vulnerability risk: High

CVSSv4.0: 6.8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2017-6969

CWE-ID: CWE-125

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Binutils
Universal components / Libraries / Libraries used by multiple products

Vendor: GNU

Description

The vulnerability allows a remote non-authenticated attacker to #BASIC_IMPACT#.

readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Binutils: 2.28


External links
https://www.securityfocus.com/bid/97065
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21156


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability