Denial of Service (DoS) Affecting binutils package, versions [,2.22]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
2.58% (90th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-BINUTILS-2368389
  • published26 Jan 2022
  • disclosed5 Sept 2012
  • creditUnknown

Introduced: 5 Sep 2012

CVE-2012-3509  (opens in a new tab)
CWE-189  (opens in a new tab)

How to fix?

There is no fixed version for binutils.

Overview

Affected versions of this package are vulnerable to Denial of Service (DoS). Multiple integer overflows in the (1) _objalloc_alloc function in objalloc.c and (2) objalloc_alloc macro in include/objalloc.h in GNU libiberty, as used by binutils 2.22, allow remote attackers to cause a denial of service (crash) via vectors related to the "addition of CHUNK_HEADER_SIZE to the length," which triggers a heap-based buffer overflow.

References

CVSS Scores

version 3.1