CVE-2016-4487

Published on: 02/24/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:26:58 PM UTC

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Certain versions of Libiberty from Gnu contain the following vulnerability:

Use-after-free vulnerability in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to "btypevec."

  • CVE-2016-4487 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 5.5 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 4.3 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
GNU GCC 'getaddrinfo.c' Multiple Remote Code Execution Vulnerabilities cve.report (archive)
text/html
URL Logo BID 90025
70481 – [Regression] Libiberty Demangler segfaults Issue Tracking
gcc.gnu.org
text/html
URL Logo CONFIRM gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
oss-security - Re: CVE Request: No Demangling During Analysis of Untrusted Binaries Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160505 Re: CVE Request: No Demangling During Analysis of Untrusted Binaries

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationGnuLibibertyAllAllAllAll
ApplicationGnuLibibertyAllAllAllAll
  • cpe:2.3:a:gnu:libiberty:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnu:libiberty:*:*:*:*:*:*:*:*: