CVE-2005-4807

GNU Binutils <20050721 - Buffer Overflow

Title source: llm
STIX 2.1

Description

Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Tavis Ormandy · bashremotelinux
https://www.exploit-db.com/exploits/28397

References (7)

Core 7
Core References
Broken Link vdb-entry x_refsource_osvdb
http://www.osvdb.org/27960
Patch, Third Party Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/usn-336-1
Patch, Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/21508
Patch, Third Party Advisory x_refsource_misc
http://bugs.gentoo.org/show_bug.cgi?id=99464
Exploit, Patch, Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/19555
Permissions Required vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2006/3307
Patch, Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/21530

Scores

EPSS 0.0625
EPSS Percentile 91.0%

Details

CWE
CWE-119
Status published
Products (3)
canonical/ubuntu_linux 5.04
canonical/ubuntu_linux 5.10
gnu/binutils < 2.17
Published Dec 31, 2005
Tracked Since Feb 18, 2026