4.3
CVSSv2

CVE-2018-20623

Published: 31/12/2018 Updated: 31/10/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

It exists that GNU binutils contained a large number of security issues. If a user or automated system were tricked into processing a specially-crafted file, a remote attacker could cause GNU binutils to crash, resulting in a denial of service, or possibly execute arbitrary code.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu binutils 2.31.1

Vendor Advisories

Several security issues were fixed in GNU binutils ...
In GNU Binutils 2311, there is a use-after-free in the error function in elfcommc when called from the process_archive function in readelfc via a crafted ELF file ...

Github Repositories

UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities

UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities Directed Greybox Fuzzing (DGF) like AFLGo aims to perform stress testing on pre-selected potentially vulnerable target locations, with applications to different security contexts: (1) bug reproduction, (2) patch testing or (3) static analysis report verification There are recently more research work that