CVE-2006-2362

Buffer overflow in getsym in tekhex.c in libbfd in Free Software Foundation GNU Binutils before 20060423, as used by GNU strings, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a file with a crafted Tektronix Hex Format (TekHex) record in which the length character is not a valid hexadecimal character.
References
Link Resource
http://lists.apple.com/archives/security-announce/2007/Oct/msg00001.html Mailing List Third Party Advisory
http://secunia.com/advisories/20188 Third Party Advisory
http://secunia.com/advisories/20531 Third Party Advisory
http://secunia.com/advisories/20550 Third Party Advisory
http://secunia.com/advisories/22932 Third Party Advisory
http://secunia.com/advisories/27441 Third Party Advisory
http://sourceware.org/bugzilla/show_bug.cgi?id=2584 Exploit Issue Tracking Third Party Advisory
http://www.mail-archive.com/bug-binutils%40gnu.org/msg01516.html Issue Tracking Mailing List
http://www.novell.com/linux/security/advisories/2006_26_sr.html Third Party Advisory
http://www.securityfocus.com/bid/17950 Exploit Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018872 Third Party Advisory VDB Entry
http://www.trustix.org/errata/2006/0034/ Broken Link
http://www.ubuntu.com/usn/usn-292-1 Broken Link
http://www.vupen.com/english/advisories/2006/1924 Permissions Required
http://www.vupen.com/english/advisories/2007/3665 Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/26644 Third Party Advisory VDB Entry
http://lists.apple.com/archives/security-announce/2007/Oct/msg00001.html Mailing List Third Party Advisory
http://secunia.com/advisories/20188 Third Party Advisory
http://secunia.com/advisories/20531 Third Party Advisory
http://secunia.com/advisories/20550 Third Party Advisory
http://secunia.com/advisories/22932 Third Party Advisory
http://secunia.com/advisories/27441 Third Party Advisory
http://sourceware.org/bugzilla/show_bug.cgi?id=2584 Exploit Issue Tracking Third Party Advisory
http://www.mail-archive.com/bug-binutils%40gnu.org/msg01516.html Issue Tracking Mailing List
http://www.novell.com/linux/security/advisories/2006_26_sr.html Third Party Advisory
http://www.securityfocus.com/bid/17950 Exploit Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018872 Third Party Advisory VDB Entry
http://www.trustix.org/errata/2006/0034/ Broken Link
http://www.ubuntu.com/usn/usn-292-1 Broken Link
http://www.vupen.com/english/advisories/2006/1924 Permissions Required
http://www.vupen.com/english/advisories/2007/3665 Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/26644 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:11

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2007/Oct/msg00001.html - Mailing List, Third Party Advisory () http://lists.apple.com/archives/security-announce/2007/Oct/msg00001.html - Mailing List, Third Party Advisory
References () http://secunia.com/advisories/20188 - Third Party Advisory () http://secunia.com/advisories/20188 - Third Party Advisory
References () http://secunia.com/advisories/20531 - Third Party Advisory () http://secunia.com/advisories/20531 - Third Party Advisory
References () http://secunia.com/advisories/20550 - Third Party Advisory () http://secunia.com/advisories/20550 - Third Party Advisory
References () http://secunia.com/advisories/22932 - Third Party Advisory () http://secunia.com/advisories/22932 - Third Party Advisory
References () http://secunia.com/advisories/27441 - Third Party Advisory () http://secunia.com/advisories/27441 - Third Party Advisory
References () http://sourceware.org/bugzilla/show_bug.cgi?id=2584 - Exploit, Issue Tracking, Third Party Advisory () http://sourceware.org/bugzilla/show_bug.cgi?id=2584 - Exploit, Issue Tracking, Third Party Advisory
References () http://www.mail-archive.com/bug-binutils%40gnu.org/msg01516.html - Issue Tracking, Mailing List () http://www.mail-archive.com/bug-binutils%40gnu.org/msg01516.html - Issue Tracking, Mailing List
References () http://www.novell.com/linux/security/advisories/2006_26_sr.html - Third Party Advisory () http://www.novell.com/linux/security/advisories/2006_26_sr.html - Third Party Advisory
References () http://www.securityfocus.com/bid/17950 - Exploit, Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/17950 - Exploit, Patch, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1018872 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1018872 - Third Party Advisory, VDB Entry
References () http://www.trustix.org/errata/2006/0034/ - Broken Link () http://www.trustix.org/errata/2006/0034/ - Broken Link
References () http://www.ubuntu.com/usn/usn-292-1 - Broken Link () http://www.ubuntu.com/usn/usn-292-1 - Broken Link
References () http://www.vupen.com/english/advisories/2006/1924 - Permissions Required () http://www.vupen.com/english/advisories/2006/1924 - Permissions Required
References () http://www.vupen.com/english/advisories/2007/3665 - Permissions Required () http://www.vupen.com/english/advisories/2007/3665 - Permissions Required
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26644 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/26644 - Third Party Advisory, VDB Entry

22 Dec 2023, 17:15

Type Values Removed Values Added
CWE NVD-CWE-Other CWE-787
References
  • {'url': 'http://www.mail-archive.com/bug-binutils@gnu.org/msg01516.html', 'name': '[bug-binutils] 20060418 [Bug binutils/2584] New: SIGSEGV in strings tool when the file is crafted.', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • () http://www.mail-archive.com/bug-binutils%40gnu.org/msg01516.html - Issue Tracking, Mailing List

Information

Published : 2006-05-15 16:06

Updated : 2024-11-21 00:11


NVD link : CVE-2006-2362

Mitre link : CVE-2006-2362

CVE.ORG link : CVE-2006-2362


JSON object : View

Products Affected

gnu

  • binutils
CWE
CWE-787

Out-of-bounds Write