Out-of-Bounds Affecting binutils package, versions [,2.17)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
1.14% (85th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-BINUTILS-2368434
  • published26 Jan 2022
  • disclosed31 Dec 2005
  • creditUnknown

Introduced: 31 Dec 2005

CVE-2005-4807  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

Upgrade binutils to version 2.17 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-Bounds. Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code.

References

CVSS Scores

version 3.1