Description
A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with "[f]ixed for 2.46".
References (8)
Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.326124
Permissions Required, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.326124
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.661277
Exploit, Issue Tracking issue-tracking
https://sourceware.org/bugzilla/show_bug.cgi?id=33457
Exploit, Issue Tracking issue-tracking
https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1
Broken Link exploit
https://sourceware.org/bugzilla/attachment.cgi?id=16353
Patch patch
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490
Product product
https://www.gnu.org/
Scores
CVSS v3
5.3
EPSS
0.0003
EPSS Percentile
7.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-119
CWE-122
Status
published
Products (1)
gnu/binutils
2.45
Published
Sep 27, 2025
Tracked Since
Feb 18, 2026