5
CVSSv2

CVE-2014-8738

Published: 15/01/2015 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The _bfd_slurp_extended_name_table function in bfd/archive.c in GNU binutils 2.24 and previous versions allows remote malicious users to cause a denial of service (invalid write, segmentation fault, and crash) via a crafted extended name table in an archive.

Vulnerable Product Search on Vulmon Subscribe to Product

fedoraproject fedora 20

fedoraproject fedora 21

debian debian linux 7.0

gnu binutils

canonical ubuntu linux 12.04

canonical ubuntu linux 14.10

canonical ubuntu linux 14.04

canonical ubuntu linux 10.04

Vendor Advisories

Synopsis Moderate: binutils security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic Updated binutils packages that fix multiple security issues, several bugs,and add various enhancements are now available for Red Hat EnterpriseLinux 7Red Hat Product Security has rated this ...
Applications from GNU binutils could be made to crash, run programs, or delete arbitrary files as your login if they opened a specially crafted file ...
Multiple security issues have been found in binutils, a toolbox for binary file manipulation These vulnerabilities include multiple memory safety errors, buffer overflows, use-after-frees and other implementation errors may lead to the execution of arbitrary code, the bypass of security restrictions, path traversal attack or denial of service For ...
A directory traversal flaw was found in the strip and objcopy utilities A specially crafted file could cause strip or objdump to overwrite an arbitrary file writable by the user running either of these utilities A buffer overflow flaw was found in the way various binutils utilities processed certain files If a user were tricked into processing a ...
A heap-based buffer overflow flaw was found in the way certain binutils utilities processed archive files If a user were tricked into processing a specially crafted archive file, it could cause the utility used to process that archive to crash or, potentially, execute arbitrary code with the privileges of the user running that utility ...