CVE-2017-16832
Published: 15 November 2017
The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file.
Priority
Status
Package | Release | Status |
---|---|---|
binutils Launchpad, Ubuntu, Debian |
trusty |
Needed
|
upstream |
Released
(2.29.90.20180122-1)
|
|
zesty |
Ignored
(end of life)
|
|
artful |
Ignored
(end of life)
|
|
bionic |
Not vulnerable
(2.30-21ubuntu1~18.04)
|
|
cosmic |
Not vulnerable
(2.30-21ubuntu1~18.04)
|
|
disco |
Not vulnerable
(2.30-21ubuntu1~18.04)
|
|
eoan |
Not vulnerable
(2.30-21ubuntu1~18.04)
|
|
focal |
Not vulnerable
(2.30-21ubuntu1~18.04)
|
|
xenial |
Released
(2.26.1-1ubuntu1~16.04.8+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
impish |
Not vulnerable
(2.30-21ubuntu1~18.04)
|
|
hirsute |
Not vulnerable
(2.30-21ubuntu1~18.04)
|
|
jammy |
Not vulnerable
(2.30-21ubuntu1~18.04)
|
|
kinetic |
Not vulnerable
(2.30-21ubuntu1~18.04)
|
|
lunar |
Not vulnerable
(2.30-21ubuntu1~18.04)
|
|
groovy |
Not vulnerable
(2.30-21ubuntu1~18.04)
|
|
mantic |
Not vulnerable
(2.30-21ubuntu1~18.04)
|
|
Patches: upstream: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0bb6961f18b8e832d88b490d421ca56cea16c45b |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |