Description
A vulnerability was detected in GNU Binutils 2.45. This issue affects the function dump_dwarf_section of the file binutils/objdump.c. Performing manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit is now public and may be used. The patch is named f87a66db645caf8cc0e6fc87b0c28c78a38af59b. It is suggested to install a patch to address this issue.
References (8)
Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.326122
Permissions Required, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.326122
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.661275
Exploit, Issue Tracking issue-tracking
https://sourceware.org/bugzilla/show_bug.cgi?id=33406
Exploit, Issue Tracking issue-tracking
https://sourceware.org/bugzilla/show_bug.cgi?id=33406#c2
Broken Link exploit
https://github.com/user-attachments/files/20623354/hdf5_crash_3.txt
Patch patch
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f87a66db645caf8cc0e6fc87b0c28c78a38af59b
Product product
https://www.gnu.org/
Scores
CVSS v3
3.3
EPSS
0.0003
EPSS Percentile
8.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-119
CWE-125
Status
published
Products (1)
gnu/binutils
2.45
Published
Sep 27, 2025
Tracked Since
Feb 18, 2026