CVE-2017-14333 — Integer Overflow or Wraparound in Binutils
Severity
7.8HIGHNVD
EPSS
0.3%
top 49.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 12
Latest updateMay 14
Description
The process_version_sections function in readelf.c in GNU Binutils 2.29 allows attackers to cause a denial of service (Integer Overflow, and hang because of a time-consuming loop) or possibly have unspecified other impact via a crafted binary file with invalid values of ent.vn_next, during "readelf -a" execution.
CVSS vector
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
3📋Vendor Advisories
3💬Community
3Bugzilla▶
CVE-2017-14333 binutils: Insuficient input validation in process_version_sections function in readelf.c↗2017-09-15
Bugzilla▶
CVE-2017-14333 binutils: Insuficient input validation in process_version_sections function in readelf.c [fedora-all]↗2017-09-15
Bugzilla▶
CVE-2017-14333 mingw-binutils: binutils: Insuficient input validation in process_version_sections function in readelf.c [epel-all]↗2017-09-15