{"api_version":"1","generated_at":"2026-04-23T09:04:08+00:00","cve":"CVE-2017-16832","urls":{"html":"https://cve.report/CVE-2017-16832","api":"https://cve.report/api/cve/CVE-2017-16832.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-16832","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-16832"},"summary":{"title":"CVE-2017-16832","description":"The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2017-11-15 08:29:00","updated_at":"2023-11-07 02:40:00"},"problem_types":["CWE-190"],"metrics":[],"references":[{"url":"https://security.gentoo.org/glsa/201811-17","name":"GLSA-201811-17","refsource":"GENTOO","tags":[],"title":"Binutils: Multiple vulnerabilities (GLSA 201811-17) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0bb6961f18b8e832d88b490d421ca56cea16c45b","name":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0bb6961f18b8e832d88b490d421ca56cea16c45b","refsource":"","tags":[],"title":"sourceware.org Git - binutils-gdb.git/commit","mime":"text/xml","httpstatus":"404","archivestatus":"200"},{"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0bb6961f18b8e832d88b490d421ca56cea16c45b","name":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0bb6961f18b8e832d88b490d421ca56cea16c45b","refsource":"CONFIRM","tags":["Patch"],"title":"sourceware.org Git - binutils-gdb.git/commit","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22373","name":"https://sourceware.org/bugzilla/show_bug.cgi?id=22373","refsource":"CONFIRM","tags":["Exploit","Issue Tracking","Patch"],"title":"22373 – Integer overflow in pe_bfd_read_buildid()","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-16832","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16832","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"16832","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"binutils","cpe6":"2.29.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"16832","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"binutils","cpe6":"2.29.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2017-16832","qid":"710297","title":"Gentoo Linux Binutils Multiple Vulnerabilities (GLSA 201811-17)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2017-16832","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://sourceware.org/bugzilla/show_bug.cgi?id=22373","refsource":"CONFIRM","url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22373"},{"name":"GLSA-201811-17","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201811-17"},{"name":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0bb6961f18b8e832d88b490d421ca56cea16c45b","refsource":"CONFIRM","url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0bb6961f18b8e832d88b490d421ca56cea16c45b"}]}},"nvd":{"publishedDate":"2017-11-15 08:29:00","lastModifiedDate":"2023-11-07 02:40:00","problem_types":["CWE-190"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"16832","Ordinal":"114578","Title":"CVE-2017-16832","CVE":"CVE-2017-16832","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"16832","Ordinal":"1","NoteData":"The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file.","Type":"Description","Title":null},{"CveYear":"2017","CveId":"16832","Ordinal":"2","NoteData":"2017-11-15","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"16832","Ordinal":"3","NoteData":"2018-11-27","Type":"Other","Title":"Modified"}]}}}