The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, do not ensure a unique PLT entry for a symbol, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.
References
Link | Resource |
---|---|
https://blogs.gentoo.org/ago/2017/09/25/binutils-heap-based-buffer-overflow-in-_bfd_x86_elf_get_synthetic_symtab-elfxx-x86-c/ | Patch Third Party Advisory VDB Entry |
https://sourceware.org/bugzilla/show_bug.cgi?id=22170 | Issue Tracking Patch Third Party Advisory |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=56933f9e3e90eebf1018ed7417d6c1184b91db6b | |
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=61e3bf5f83f7e505b6bc51ef65426e5b31e6e360 |
Configurations
History
No history.
Information
Published : 2017-09-25 16:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-14729
Mitre link : CVE-2017-14729
CVE.ORG link : CVE-2017-14729
JSON object : View
Products Affected
gnu
- binutils
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer