Vulnerability Name: | CVE-2017-14933 (CCN-132840) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2017-09-27 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2017-09-27 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2019-10-03 | ||||||||||||||||||||||||||||||||||||||||
Summary: | read_formatted_entries in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (infinite loop) via a crafted ELF file. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
2.9 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-835 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-14933 Source: BID Type: UNKNOWN 101203 Source: CCN Type: BID-101203 GNU Binutils 'read_formatted_entries()' Function Remote Denial of Service Vulnerability Source: XF Type: UNKNOWN binutils-cve201714933-dos(132840) Source: GENTOO Type: UNKNOWN GLSA-201811-17 Source: CCN Type: Sourceware Bugzilla Bug 22210 large loop in read_formatted_entries in dwarf2.c in binutils 2.30(HEAD) Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://sourceware.org/bugzilla/show_bug.cgi?id=22210 Source: CCN Type: Sourceware.org Git- binutils-gdb.git/commit Avoid needless resource usage when processing a corrupt DWARF directory or file name Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=30d0157a2ad64e64e5ff9fcc0dbe78a3e682f573 Source: CCN Type: Sourceware.org Git- binutils-gdb.git/commit Tidy reading data in read_formatted_entries Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=33e0a9a056bd23e923b929a4f2ab049ade0b1c32 Source: CCN Type: GNU Binutils Web site GNU Binutils - GNU.org Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-14933 | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |