A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://vuldb.com/?id.316243 | technical description vdb entry third party advisory |
https://vuldb.com/?ctiid.316243 | signature vdb entry permissions required |
https://vuldb.com/?submit.614355 | vdb entry third party advisory |
https://sourceware.org/bugzilla/show_bug.cgi?id=33049 | issue tracking |
https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1 | issue tracking |
https://sourceware.org/bugzilla/attachment.cgi?id=16117 | broken link exploit |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944 | broken link patch |
https://www.gnu.org/ | product |