In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://sourceware.org/bugzilla/show_bug.cgi?id=22741 | issue tracking third party advisory |
https://access.redhat.com/errata/RHSA-2018:3032 | third party advisory vendor advisory |
https://security.gentoo.org/glsa/201811-17 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/103077 | vdb entry third party advisory |
https://access.redhat.com/errata/RHBA-2019:0327 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html | vendor advisory |