CVE-2016-4492Improper Restriction of Operations within the Bounds of a Memory Buffer in Binutils

Severity
4.4MEDIUMNVD
EPSS
0.2%
top 54.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 24
Latest updateMay 17

Description

Buffer overflow in the do_type function in cplus-dem.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:HExploitability: 0.8 | Impact: 3.6

Affected Packages1 packages

Debiangnu/binutils< 2.27.51.20161102-1+3

Patches

🔴Vulnerability Details

4
GHSA
GHSA-v5h9-4mvm-w8vm: Buffer overflow in the do_type function in cplus-dem2022-05-17
OSV
valgrind vulnerabilities2017-06-21
OSV
CVE-2016-4492: Buffer overflow in the do_type function in cplus-dem2017-02-24
CVEList
CVE-2016-4492: Buffer overflow in the do_type function in cplus-dem2017-02-24

📋Vendor Advisories

6
Ubuntu
GNU binutils vulnerabilities2021-07-21
Ubuntu
gdb vulnerabilities2017-07-26
Ubuntu
libiberty vulnerabilities2017-07-26
Ubuntu
Valgrind vulnerabilities2017-06-21
Red Hat
gcc: Read access violations2016-05-03

💬Community

3
Bugzilla
CVE-2016-2226 CVE-2016-4487 CVE-2016-4488 CVE-2016-4489 CVE-2016-4490 CVE-2016-4491 CVE-2016-4492 CVE-2016-4493 mingw-gcc: various flaws [epel-all]2016-05-05
Bugzilla
CVE-2016-2226 CVE-2016-4487 CVE-2016-4488 CVE-2016-4489 CVE-2016-4490 CVE-2016-4491 CVE-2016-4492 CVE-2016-4493 msp430-gcc: various flaws [fedora-all]2016-05-05
Bugzilla
CVE-2016-4492 gcc: Read access violations2016-05-05
CVE-2016-4492 — GNU Binutils vulnerability | cvebase