CVE-2025-1147

LOW

GNU Binutils - Memory Corruption

Title source: rule
STIX 2.1

Description

A vulnerability has been found in GNU Binutils 2.43 and classified as problematic. Affected by this vulnerability is the function __sanitizer::internal_strlen of the file binutils/nm.c of the component nm. The manipulation of the argument const leads to buffer overflow. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.

References (7)

Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.295051
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.295051
Exploit, Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.485254
Exploit, Issue Tracking issue-tracking
https://sourceware.org/bugzilla/show_bug.cgi?id=32556
Product product
https://www.gnu.org/

Scores

CVSS v3 3.1
EPSS 0.0007
EPSS Percentile 20.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-119 CWE-120
Status published
Products (1)
gnu/binutils 2.43
Published Feb 10, 2025
Tracked Since Feb 18, 2026