7.5
CVSSv2

CVE-2014-8485

Published: 09/12/2014 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The setup_group function in bfd/elf.c in libbfd in GNU binutils 2.24 and previous versions allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via crafted section group headers in an ELF file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fedoraproject fedora 20

fedoraproject fedora 21

fedoraproject fedora 19

canonical ubuntu linux 12.04

canonical ubuntu linux 14.10

canonical ubuntu linux 14.04

canonical ubuntu linux 10.04

gnu binutils

Vendor Advisories

Synopsis Moderate: binutils security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic Updated binutils packages that fix multiple security issues, several bugs,and add various enhancements are now available for Red Hat EnterpriseLinux 7Red Hat Product Security has rated this ...
Applications from GNU binutils could be made to crash, run programs, or delete arbitrary files as your login if they opened a specially crafted file ...
Multiple security issues have been found in binutils, a toolbox for binary file manipulation These vulnerabilities include multiple memory safety errors, buffer overflows, use-after-frees and other implementation errors may lead to the execution of arbitrary code, the bypass of security restrictions, path traversal attack or denial of service For ...
A directory traversal flaw was found in the strip and objcopy utilities A specially crafted file could cause strip or objdump to overwrite an arbitrary file writable by the user running either of these utilities A buffer overflow flaw was found in the way various binutils utilities processed certain files If a user were tricked into processing a ...
A buffer overflow flaw was found in the way various binutils utilities processed certain files If a user were tricked into processing a specially crafted file, it could cause the utility used to process that file to crash or, potentially, execute arbitrary code with the privileges of the user running that utility ...

Recent Articles

Kaspersky Security Bulletin. 2016 Predictions
Securelist • Juan Andrés Guerrero-Saade GReAT • 17 Nov 2015

Download PDF version Download EPUB Download Full Report PDF Download Full Report EPUB As the year comes to an end, we have an opportunity to take stock of how the industry has evolved and to cast our predictions for the coming years. Taking advantage of a rare global meeting of our GReAT and Anti-Malware Research experts, we tossed ideas into the ring and I have the privilege of selecting some of the more noteworthy and plausible for both the coming year and the long-term future as we foresee...