7.8
CVSSv3

CVE-2017-17124

Published: 04/12/2017 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The _bfd_coff_read_string_table function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not properly validate the size of the external string table, which allows remote malicious users to cause a denial of service (excessive memory consumption, or heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted COFF binary.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu binutils 2.29.1

Vendor Advisories

The _bfd_coff_read_string_table function in coffgenc in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2291, does not properly validate the size of the external string table, which allows remote attackers to cause a denial of service (excessive memory consumption, or heap-based buffer overflow and applicati ...
The _bfd_coff_read_string_table function in coffgenc in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2291, does not properly validate the size of the external string table, which allows remote attackers to cause a denial of service (excessive memory consumption, or heap-based buffer overflow and applicati ...