GNU BinUtils Buffer Overflow Vulnerability
BID:17950
CVE-2006-2362 |Info
GNU BinUtils Buffer Overflow Vulnerability
| Bugtraq ID: | 17950 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2006-2362 |
| Remote: | Yes |
| Local: | No |
| Published: | May 11 2006 12:00AM |
| Updated: | Mar 19 2015 08:44AM |
| Credit: | Jesus Olmos Gonzalez discovered this vulnerability. |
| Vulnerable: |
Ubuntu Ubuntu Linux 5.10 powerpc Ubuntu Ubuntu Linux 5.10 i386 Ubuntu Ubuntu Linux 5.10 amd64 Ubuntu Ubuntu Linux 5.0 4 powerpc Ubuntu Ubuntu Linux 5.0 4 i386 Ubuntu Ubuntu Linux 5.0 4 amd64 Ubuntu Ubuntu Linux 6.06 LTS powerpc Ubuntu Ubuntu Linux 6.06 LTS i386 Ubuntu Ubuntu Linux 6.06 LTS amd64 Trustix Secure Linux 3.0 Trustix Secure Linux 2.2 Trustix Secure Enterprise Linux 2.0 SuSE SUSE Linux Enterprise Server 9 SuSE SUSE Linux Enterprise Server 8 S.u.S.E. UnitedLinux 1.0 S.u.S.E. SuSE Linux Standard Server 8.0 S.u.S.E. SuSE Linux School Server for i386 S.u.S.E. SUSE LINUX Retail Solution 8.0 S.u.S.E. SuSE Linux Openexchange Server 4.0 S.u.S.E. Novell Linux Desktop 9.0 S.u.S.E. Linux Professional 9.3 x86_64 S.u.S.E. Linux Professional 9.3 S.u.S.E. Linux Professional 9.2 x86_64 S.u.S.E. Linux Professional 9.2 S.u.S.E. Linux Professional 9.1 x86_64 S.u.S.E. Linux Professional 9.1 S.u.S.E. Linux Professional 9.0 x86_64 S.u.S.E. Linux Professional 9.0 S.u.S.E. Linux Professional 8.2 S.u.S.E. Linux Personal 9.3 x86_64 S.u.S.E. Linux Personal 9.3 S.u.S.E. Linux Personal 9.2 x86_64 S.u.S.E. Linux Personal 9.2 S.u.S.E. Linux Personal 9.1 x86_64 S.u.S.E. Linux Personal 9.1 S.u.S.E. Linux Personal 9.0 x86_64 S.u.S.E. Linux Personal 9.0 S.u.S.E. Linux Personal 8.2 S.u.S.E. cvsup-16.1h-2.i386.rpm Red Hat Enterprise Linux AS 3 OpenPKG OpenPKG 2.5 OpenPKG OpenPKG 2.4 OpenPKG OpenPKG Current Mandriva Linux Mandrake 2006.0 x86_64 Mandriva Linux Mandrake 2006.0 MandrakeSoft Corporate Server 3.0 x86_64 MandrakeSoft Corporate Server 3.0 GNU strings 0 GNU Binutils 2.16.1 GNU Binutils 2.15 GNU Binutils 2.14 GNU Binutils 2.12 GNU Binutils 2.11 GNU Binutils 2.14.90.0.7 Apple Mac OS X 10.4.10 Apple Mac OS X 10.4.9 Apple Mac OS X 10.4.8 Apple Mac OS X 10.4.7 Apple Mac OS X 10.4.6 Apple Mac OS X 10.4.5 Apple Mac OS X 10.4.4 Apple Mac OS X 10.4.3 Apple Mac OS X 10.4.2 Apple Mac OS X 10.4.1 Apple Mac OS X 10.4 Apple Mac OS X 10.5 |
| Not Vulnerable: | |
Discussion
GNU BinUtils Buffer Overflow Vulnerability
GNU 'binutils' is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.
Remote attackers may crash the 'strings' utility, potentially making analysis of malicious binaries more difficult. Attackers may also execute arbitrary machine code in the context of applications that use the affected library.
GNU 'binutils' is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.
Remote attackers may crash the 'strings' utility, potentially making analysis of malicious binaries more difficult. Attackers may also execute arbitrary machine code in the context of applications that use the affected library.
Exploit / POC
GNU BinUtils Buffer Overflow Vulnerability
The following file contents are sufficient to demonstrate this issue by crashing 'strings':
%253Cc%253Cc%253Cc%253Cc%253Cc%253Cc%253Cc
Currently we are not aware of any working exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
The following file contents are sufficient to demonstrate this issue by crashing 'strings':
%253Cc%253Cc%253Cc%253Cc%253Cc%253Cc%253Cc
Currently we are not aware of any working exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
GNU BinUtils Buffer Overflow Vulnerability
Solution:
The vendor released updates to address this issue. Please see the references for more information.
GNU Binutils 2.14.90.0.7
GNU Binutils 2.15
GNU Binutils 2.16.1
Solution:
The vendor released updates to address this issue. Please see the references for more information.
GNU Binutils 2.14.90.0.7
-
Mandriva binutils-2.14.90.0.7-2.3.C30mdk.i586.rpm
Corporate 3.0:
http://wwwnew.mandriva.com/en/downloads -
Mandriva binutils-2.14.90.0.7-2.3.C30mdk.x86_64.rpm
Corporate 3.0:
http://wwwnew.mandriva.com/en/downloads -
Mandriva lib64binutils2-2.14.90.0.7-2.3.C30mdk.x86_64.rpm
Corporate 3.0:
http://wwwnew.mandriva.com/en/downloads -
Mandriva lib64binutils2-devel-2.14.90.0.7-2.3.C30mdk.x86_64.rpm
Corporate 3.0:
http://wwwnew.mandriva.com/en/downloads -
Mandriva libbinutils2-2.14.90.0.7-2.3.C30mdk.i586.rpm
Corporate 3.0:
http://wwwnew.mandriva.com/en/downloads -
Mandriva libbinutils2-devel-2.14.90.0.7-2.3.C30mdk.i586.rpm
Corporate 3.0:
http://wwwnew.mandriva.com/en/downloads
GNU Binutils 2.15
-
Ubuntu binutils-dev_2.15-5ubuntu2.3_amd64.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-dev_2. 15-5ubuntu2.3_amd64.deb -
Ubuntu binutils-dev_2.15-5ubuntu2.3_i386.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-dev_2. 15-5ubuntu2.3_i386.deb -
Ubuntu binutils-dev_2.15-5ubuntu2.3_powerpc.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-dev_2. 15-5ubuntu2.3_powerpc.deb -
Ubuntu binutils-doc_2.15-5ubuntu2.3_all.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-doc_2. 15-5ubuntu2.3_all.deb -
Ubuntu binutils-multiarch_2.15-5ubuntu2.3_amd64.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/universe/b/binutils/binutils-mu ltiarch_2.15-5ubuntu2.3_amd64.deb -
Ubuntu binutils-multiarch_2.15-5ubuntu2.3_i386.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/universe/b/binutils/binutils-mu ltiarch_2.15-5ubuntu2.3_i386.deb -
Ubuntu binutils-multiarch_2.15-5ubuntu2.3_powerpc.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/universe/b/binutils/binutils-mu ltiarch_2.15-5ubuntu2.3_powerpc.deb -
Ubuntu binutils_2.15-5ubuntu2.3_amd64.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils_2.15-5 ubuntu2.3_amd64.deb -
Ubuntu binutils_2.15-5ubuntu2.3_i386.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils_2.15-5 ubuntu2.3_i386.deb -
Ubuntu binutils_2.15-5ubuntu2.3_powerpc.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils_2.15-5 ubuntu2.3_powerpc.deb
GNU Binutils 2.16.1
-
Ubuntu binutils-dev_2.16.1-2ubuntu6.1_amd64.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-dev_2. 16.1-2ubuntu6.1_amd64.deb -
Ubuntu binutils-dev_2.16.1-2ubuntu6.1_i386.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-dev_2. 16.1-2ubuntu6.1_i386.deb -
Ubuntu binutils-dev_2.16.1-2ubuntu6.1_powerpc.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-dev_2. 16.1-2ubuntu6.1_powerpc.deb -
Ubuntu binutils-dev_2.16.1cvs20060117-1ubuntu2.1_amd64.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-dev_2. 16.1cvs20060117-1ubuntu2.1_amd64.deb -
Ubuntu binutils-dev_2.16.1cvs20060117-1ubuntu2.1_i386.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-dev_2. 16.1cvs20060117-1ubuntu2.1_i386.deb -
Ubuntu binutils-dev_2.16.1cvs20060117-1ubuntu2.1_powerpc.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-dev_2. 16.1cvs20060117-1ubuntu2.1_powerpc.deb -
Ubuntu binutils-doc_2.16.1-2ubuntu6.1_all.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-doc_2. 16.1-2ubuntu6.1_all.deb -
Ubuntu binutils-doc_2.16.1cvs20060117-1ubuntu2.1_all.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-doc_2. 16.1cvs20060117-1ubuntu2.1_all.deb -
Ubuntu binutils-multiarch_2.16.1-2ubuntu6.1_amd64.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/universe/b/binutils/binutils-mu ltiarch_2.16.1-2ubuntu6.1_amd64.deb -
Ubuntu binutils-multiarch_2.16.1-2ubuntu6.1_i386.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/universe/b/binutils/binutils-mu ltiarch_2.16.1-2ubuntu6.1_i386.deb -
Ubuntu binutils-multiarch_2.16.1-2ubuntu6.1_powerpc.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/universe/b/binutils/binutils-mu ltiarch_2.16.1-2ubuntu6.1_powerpc.deb -
Ubuntu binutils-multiarch_2.16.1cvs20060117-1ubuntu2.1_amd64.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/universe/b/binutils/binutils-mu ltiarch_2.16.1cvs20060117-1ubuntu2.1_amd64.deb -
Ubuntu binutils-multiarch_2.16.1cvs20060117-1ubuntu2.1_i386.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/universe/b/binutils/binutils-mu ltiarch_2.16.1cvs20060117-1ubuntu2.1_i386.deb -
Ubuntu binutils-multiarch_2.16.1cvs20060117-1ubuntu2.1_powerpc.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/universe/b/binutils/binutils-mu ltiarch_2.16.1cvs20060117-1ubuntu2.1_powerpc.deb -
Ubuntu binutils-static-udeb_2.16.1-2ubuntu6.1_amd64.udeb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-static -udeb_2.16.1-2ubuntu6.1_amd64.udeb -
Ubuntu binutils-static-udeb_2.16.1-2ubuntu6.1_i386.udeb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-static -udeb_2.16.1-2ubuntu6.1_i386.udeb -
Ubuntu binutils-static-udeb_2.16.1-2ubuntu6.1_powerpc.udeb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-static -udeb_2.16.1-2ubuntu6.1_powerpc.udeb -
Ubuntu binutils-static-udeb_2.16.1cvs20060117-1ubuntu2.1_amd64.udeb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-static -udeb_2.16.1cvs20060117-1ubuntu2.1_amd64.udeb -
Ubuntu binutils-static-udeb_2.16.1cvs20060117-1ubuntu2.1_i386.udeb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-static -udeb_2.16.1cvs20060117-1ubuntu2.1_i386.udeb -
Ubuntu binutils-static-udeb_2.16.1cvs20060117-1ubuntu2.1_powerpc.udeb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-static -udeb_2.16.1cvs20060117-1ubuntu2.1_powerpc.udeb -
Ubuntu binutils-static_2.16.1-2ubuntu6.1_amd64.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-static _2.16.1-2ubuntu6.1_amd64.deb -
Ubuntu binutils-static_2.16.1-2ubuntu6.1_i386.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-static _2.16.1-2ubuntu6.1_i386.deb -
Ubuntu binutils-static_2.16.1-2ubuntu6.1_powerpc.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-static _2.16.1-2ubuntu6.1_powerpc.deb -
Ubuntu binutils-static_2.16.1cvs20060117-1ubuntu2.1_amd64.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-static _2.16.1cvs20060117-1ubuntu2.1_amd64.deb -
Ubuntu binutils-static_2.16.1cvs20060117-1ubuntu2.1_i386.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-static _2.16.1cvs20060117-1ubuntu2.1_i386.deb -
Ubuntu binutils-static_2.16.1cvs20060117-1ubuntu2.1_powerpc.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils-static _2.16.1cvs20060117-1ubuntu2.1_powerpc.deb -
Ubuntu binutils_2.16.1-2ubuntu6.1_amd64.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils_2.16.1 -2ubuntu6.1_amd64.deb -
Ubuntu binutils_2.16.1-2ubuntu6.1_i386.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils_2.16.1 -2ubuntu6.1_i386.deb -
Ubuntu binutils_2.16.1-2ubuntu6.1_powerpc.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils_2.16.1 -2ubuntu6.1_powerpc.deb -
Ubuntu binutils_2.16.1cvs20060117-1ubuntu2.1_amd64.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils_2.16.1 cvs20060117-1ubuntu2.1_amd64.deb -
Ubuntu binutils_2.16.1cvs20060117-1ubuntu2.1_i386.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils_2.16.1 cvs20060117-1ubuntu2.1_i386.deb -
Ubuntu binutils_2.16.1cvs20060117-1ubuntu2.1_powerpc.deb
Ubuntu 6.06 LTS:
http://security.ubuntu.com/ubuntu/pool/main/b/binutils/binutils_2.16.1 cvs20060117-1ubuntu2.1_powerpc.deb
References
GNU BinUtils Buffer Overflow Vulnerability
References:
References:
- Bugzilla Bug 2584 (GNU)
- Vendor Homepage (Sony)