The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a "SECTION" type that has a "0" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2018:3032 | third party advisory vendor advisory |
https://sourceware.org/bugzilla/show_bug.cgi?id=23113 | third party advisory issue tracking |
http://www.securityfocus.com/bid/104021 | third party advisory vdb entry |
https://access.redhat.com/errata/RHBA-2019:0327 | third party advisory vendor advisory |
https://security.gentoo.org/glsa/201908-01 | vendor advisory |
https://usn.ubuntu.com/4336-1/ | vendor advisory |