Heap-based buffer overflow in Binutils - CVE-2017-17124

 

Heap-based buffer overflow in Binutils - CVE-2017-17124

Published: December 4, 2017 / Updated: February 10, 2022


Vulnerability identifier: #VU37861
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2017-17124
CWE-ID: CWE-122
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: GNU
Affected software:
Binutils

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in The _bfd_coff_read_string_table function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not properly validate the size of the external string table, which. A remote attacker can use a crafted COFF binary. to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


How to mitigate CVE-2017-17124

Install update from vendor's website.

Sources