CVE-2025-1153

A vulnerability classified as problematic was found in GNU Binutils 2.43/2.44. Affected by this vulnerability is the function bfd_set_format of the file format.c. The manipulation leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 2.45 is able to address this issue. The identifier of the patch is 8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150. It is recommended to upgrade the affected component.
References
Link Resource
https://sourceware.org/bugzilla/show_bug.cgi?id=32603 Exploit Issue Tracking Third Party Advisory
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150 Patch
https://vuldb.com/?ctiid.295057 Permissions Required VDB Entry
https://vuldb.com/?id.295057 Permissions Required VDB Entry
https://vuldb.com/?submit.489991 Exploit Third Party Advisory VDB Entry
https://www.gnu.org/ Product
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*
cpe:2.3:a:gnu:binutils:2.44:*:*:*:*:*:*:*

History

03 Mar 2025, 16:52

Type Values Removed Values Added
References () https://sourceware.org/bugzilla/show_bug.cgi?id=32603 - () https://sourceware.org/bugzilla/show_bug.cgi?id=32603 - Exploit, Issue Tracking, Third Party Advisory
References () https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150 - () https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150 - Patch
References () https://vuldb.com/?ctiid.295057 - () https://vuldb.com/?ctiid.295057 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.295057 - () https://vuldb.com/?id.295057 - Permissions Required, VDB Entry
References () https://vuldb.com/?submit.489991 - () https://vuldb.com/?submit.489991 - Exploit, Third Party Advisory, VDB Entry
References () https://www.gnu.org/ - () https://www.gnu.org/ - Product
Summary
  • (es) Se ha encontrado una vulnerabilidad clasificada como problemática en GNU Binutils 2.43/2.44. Esta vulnerabilidad afecta a la función bfd_set_format del archivo format.c. La manipulación provoca la corrupción de la memoria. El ataque puede ejecutarse de forma remota. La complejidad de un ataque es bastante alta. La explotación parece ser difícil. La actualización a la versión 2.45 puede solucionar este problema. El identificador del parche es 8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150. Se recomienda actualizar el componente afectado.
First Time Gnu binutils
Gnu
CPE cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*
cpe:2.3:a:gnu:binutils:2.44:*:*:*:*:*:*:*

10 Feb 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-10 19:15

Updated : 2025-03-03 16:52


NVD link : CVE-2025-1153

Mitre link : CVE-2025-1153

CVE.ORG link : CVE-2025-1153


JSON object : View

Products Affected

gnu

  • binutils
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer