GNU libiberty CVE-2018-20673 Integer Overflow Vulnerability
BID:106454
CVE-2018-20673 |Info
GNU libiberty CVE-2018-20673 Integer Overflow Vulnerability
| Bugtraq ID: | 106454 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2018-20673 |
| Remote: | Yes |
| Local: | No |
| Published: | Dec 27 2018 12:00AM |
| Updated: | Dec 27 2018 12:00AM |
| Credit: | tfx |
| Vulnerable: |
GNU Binutils 2.31.1 |
| Not Vulnerable: | |
Discussion
GNU libiberty CVE-2018-20673 Integer Overflow Vulnerability
GNU libiberty is prone to an integer overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer.
An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
GNU Binutils 2.31.1 is vulnerable; other versions may also be affected.
GNU libiberty is prone to an integer overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer.
An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
GNU Binutils 2.31.1 is vulnerable; other versions may also be affected.
References
GNU libiberty CVE-2018-20673 Integer Overflow Vulnerability
References:
References: