opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
References
| Link | Resource |
|---|---|
| http://www.securityfocus.com/bid/99124 | Third Party Advisory VDB Entry |
| https://security.gentoo.org/glsa/201801-01 | |
| https://sourceware.org/bugzilla/show_bug.cgi?id=21594 | Issue Tracking Patch Third Party Advisory |
| http://www.securityfocus.com/bid/99124 | Third Party Advisory VDB Entry |
| https://security.gentoo.org/glsa/201801-01 | |
| https://sourceware.org/bugzilla/show_bug.cgi?id=21594 | Issue Tracking Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:36
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.securityfocus.com/bid/99124 - Third Party Advisory, VDB Entry | |
| References | () https://security.gentoo.org/glsa/201801-01 - | |
| References | () https://sourceware.org/bugzilla/show_bug.cgi?id=21594 - Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2017-06-19 04:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-9755
Mitre link : CVE-2017-9755
CVE.ORG link : CVE-2017-9755
JSON object : View
Products Affected
gnu
- binutils
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
