CVE-2025-1179

A vulnerability was found in GNU Binutils 2.43. It has been rated as critical. Affected by this issue is the function bfd_putl64 of the file bfd/libbfd.c of the component ld. The manipulation leads to memory corruption. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. It is recommended to upgrade the affected component. The code maintainer explains, that "[t]his bug has been fixed at some point between the 2.43 and 2.44 releases".
References
Link Resource
https://sourceware.org/bugzilla/attachment.cgi?id=15915 Exploit Issue Tracking Third Party Advisory
https://sourceware.org/bugzilla/show_bug.cgi?id=32640 Exploit Issue Tracking
https://sourceware.org/bugzilla/show_bug.cgi?id=32640#c1 Exploit Issue Tracking
https://vuldb.com/?ctiid.295082 Permissions Required VDB Entry
https://vuldb.com/?id.295082 Permissions Required VDB Entry
https://vuldb.com/?submit.495376 Exploit Third Party Advisory VDB Entry
https://www.gnu.org/ Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*

History

03 Mar 2025, 16:52

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en GNU Binutils 2.43. Se ha calificado como crítica. Este problema afecta a la función bfd_putl64 del archivo bfd/libbfd.c del componente ld. La manipulación provoca la corrupción de la memoria. El ataque puede ejecutarse de forma remota. La complejidad de un ataque es bastante alta. Se sabe que la explotación es difícil. El exploit se ha hecho público y puede utilizarse. La actualización a la versión 2.44 puede solucionar este problema. Se recomienda actualizar el componente afectado. El código fabricante explica que "[e]ste error se ha corregido en algún momento entre las versiones 2.43 y 2.44".
First Time Gnu binutils
Gnu
CPE cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*
References () https://sourceware.org/bugzilla/attachment.cgi?id=15915 - () https://sourceware.org/bugzilla/attachment.cgi?id=15915 - Exploit, Issue Tracking, Third Party Advisory
References () https://sourceware.org/bugzilla/show_bug.cgi?id=32640 - () https://sourceware.org/bugzilla/show_bug.cgi?id=32640 - Exploit, Issue Tracking
References () https://sourceware.org/bugzilla/show_bug.cgi?id=32640#c1 - () https://sourceware.org/bugzilla/show_bug.cgi?id=32640#c1 - Exploit, Issue Tracking
References () https://vuldb.com/?ctiid.295082 - () https://vuldb.com/?ctiid.295082 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.295082 - () https://vuldb.com/?id.295082 - Permissions Required, VDB Entry
References () https://vuldb.com/?submit.495376 - () https://vuldb.com/?submit.495376 - Exploit, Third Party Advisory, VDB Entry
References () https://www.gnu.org/ - () https://www.gnu.org/ - Product

11 Feb 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-11 07:15

Updated : 2025-03-03 16:52


NVD link : CVE-2025-1179

Mitre link : CVE-2025-1179

CVE.ORG link : CVE-2025-1179


JSON object : View

Products Affected

gnu

  • binutils
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer