{"api_version":"1","generated_at":"2026-04-23T08:50:06+00:00","cve":"CVE-2017-17124","urls":{"html":"https://cve.report/CVE-2017-17124","api":"https://cve.report/api/cve/CVE-2017-17124.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-17124","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-17124"},"summary":{"title":"CVE-2017-17124","description":"The _bfd_coff_read_string_table function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not properly validate the size of the external string table, which allows remote attackers to cause a denial of service (excessive memory consumption, or heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted COFF binary.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2017-12-04 08:29:00","updated_at":"2023-11-07 02:41:00"},"problem_types":["CWE-119"],"metrics":[],"references":[{"url":"https://security.gentoo.org/glsa/201811-17","name":"GLSA-201811-17","refsource":"GENTOO","tags":[],"title":"Binutils: Multiple vulnerabilities (GLSA 201811-17) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=b0029dce6867de1a2828293177b0e030d2f0f03c","name":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=b0029dce6867de1a2828293177b0e030d2f0f03c","refsource":"","tags":[],"title":"sourceware.org Git - binutils-gdb.git/commit","mime":"text/xml","httpstatus":"404","archivestatus":"200"},{"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22507","name":"https://sourceware.org/bugzilla/show_bug.cgi?id=22507","refsource":"MISC","tags":["Exploit","Issue Tracking"],"title":"22507 – Heap buffer overflow on _bfd_coff_read_string_table","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b0029dce6867de1a2828293177b0e030d2f0f03c","name":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b0029dce6867de1a2828293177b0e030d2f0f03c","refsource":"MISC","tags":["Patch"],"title":"sourceware.org Git - binutils-gdb.git/commit","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-17124","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17124","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"17124","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"binutils","cpe6":"2.29.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"17124","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"binutils","cpe6":"2.29.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2017-17124","qid":"710297","title":"Gentoo Linux Binutils Multiple Vulnerabilities (GLSA 201811-17)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2017-17124","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The _bfd_coff_read_string_table function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not properly validate the size of the external string table, which allows remote attackers to cause a denial of service (excessive memory consumption, or heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted COFF binary."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b0029dce6867de1a2828293177b0e030d2f0f03c","refsource":"MISC","url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b0029dce6867de1a2828293177b0e030d2f0f03c"},{"name":"https://sourceware.org/bugzilla/show_bug.cgi?id=22507","refsource":"MISC","url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22507"},{"name":"GLSA-201811-17","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201811-17"}]}},"nvd":{"publishedDate":"2017-12-04 08:29:00","lastModifiedDate":"2023-11-07 02:41:00","problem_types":["CWE-119"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"17124","Ordinal":"116015","Title":"CVE-2017-17124","CVE":"CVE-2017-17124","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"17124","Ordinal":"1","NoteData":"The _bfd_coff_read_string_table function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not properly validate the size of the external string table, which allows remote attackers to cause a denial of service (excessive memory consumption, or heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted COFF binary.","Type":"Description","Title":null},{"CveYear":"2017","CveId":"17124","Ordinal":"2","NoteData":"2017-12-04","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"17124","Ordinal":"3","NoteData":"2018-11-27","Type":"Other","Title":"Modified"}]}}}