CVE-2017-9750

HIGH

GNU Binutils 2.28 - Buffer Overflow

Title source: llm
STIX 2.1

Description

opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Alexandre Adamski · textdoslinux
https://www.exploit-db.com/exploits/42198

References (4)

Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/99118
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201801-01
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/42198/
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://sourceware.org/bugzilla/show_bug.cgi?id=21587

Scores

CVSS v3 7.8
EPSS 0.0239
EPSS Percentile 85.1%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CWE
CWE-119
Status published
Products (1)
gnu/binutils 2.28
Published Jun 19, 2017
Tracked Since Feb 18, 2026