Vulnerability Name: | CVE-2017-13710 (CCN-131063) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2017-08-14 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2017-08-14 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2017-08-30 | ||||||||||||||||||||||||||||||||||||||||
Summary: | The setup_group function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a group section that is too small. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
2.9 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-476 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-13710 Source: CCN Type: IBM Security Bulletin 2012609 (PureData System for Analytics) Multiple vulnerabilities in GNU Binutils affect IBM Netezza Platform Software clients. Source: BID Type: UNKNOWN 100499 Source: CCN Type: BID-100499 GNU Binutils CVE-2017-13710 Remote Denial of Service Vulnerability Source: XF Type: UNKNOWN gnu-binutils-cve201713710-dos(131063) Source: CCN Type: Binutils GIT Repository Fix null pointer dereference when parsing a corrupt ELF binary Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0c54f69295208331faab9bc5e995111a35672f9b Source: CCN Type: GNU.org Web site GNU Binutils - GNU.org Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-13710 | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |