opcodes/rl78-decode.opc in GNU Binutils 2.28 has an unbounded GETBYTE macro, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
References
| Link | Resource |
|---|---|
| http://www.securityfocus.com/bid/99111 | Third Party Advisory VDB Entry |
| https://security.gentoo.org/glsa/201801-01 | |
| https://sourceware.org/bugzilla/show_bug.cgi?id=21588 | Issue Tracking Patch Third Party Advisory |
| http://www.securityfocus.com/bid/99111 | Third Party Advisory VDB Entry |
| https://security.gentoo.org/glsa/201801-01 | |
| https://sourceware.org/bugzilla/show_bug.cgi?id=21588 | Issue Tracking Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:36
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.securityfocus.com/bid/99111 - Third Party Advisory, VDB Entry | |
| References | () https://security.gentoo.org/glsa/201801-01 - | |
| References | () https://sourceware.org/bugzilla/show_bug.cgi?id=21588 - Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2017-06-19 04:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-9751
Mitre link : CVE-2017-9751
CVE.ORG link : CVE-2017-9751
JSON object : View
Products Affected
gnu
- binutils
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
