Description
Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Tavis Ormandy · bashremotelinux
https://www.exploit-db.com/exploits/28397
References (7)
Core 7
Core References
Broken Link vdb-entry
x_refsource_osvdb
http://www.osvdb.org/27960
Patch, Third Party Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/usn-336-1
Patch, Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/21508
Patch, Third Party Advisory x_refsource_misc
http://bugs.gentoo.org/show_bug.cgi?id=99464
Exploit, Patch, Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/19555
Permissions Required vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/3307
Patch, Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/21530
Scores
EPSS
0.0625
EPSS Percentile
91.0%
Details
CWE
CWE-119
Status
published
Products (3)
canonical/ubuntu_linux
5.04
canonical/ubuntu_linux
5.10
gnu/binutils
< 2.17
Published
Dec 31, 2005
Tracked Since
Feb 18, 2026