7.8
CVSSv3

CVE-2016-2226

Published: 24/02/2017 Updated: 12/08/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote malicious users to execute arbitrary code via a crafted executable, which triggers a buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu libiberty

Vendor Advisories

Debian Bug report logs - #840358 Multiple security issues in libiberty Package: ht; Maintainer for ht is Anton Gladky <gladk@debianorg>; Source for ht is src:ht (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Mon, 10 Oct 2016 21:39:02 UTC Severity: grave Tags: fixed-upstream, security, ...
Several security issues were fixed in gdb ...
Several security issues were fixed in libiberty ...
Valgrind could be made to crash or run programs if it opened a specially crafted file ...
Integer overflow in the string_appends function in cplus-demc in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow ...

Exploits

Source: gccgnuorg/bugzilla/show_bugcgi?id=69687 The attached program binary causes a buffer overflow in cplus-demc when it tries to demangle specially crafted function arguments in the binary Both the buffer size as well as the buffer content are controlled from the binary objdump -x -C <file> nm -C <file> Tested on th ...