CVE-2017-14333Integer Overflow or Wraparound in Binutils

Severity
7.8HIGHNVD
EPSS
0.3%
top 49.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 12
Latest updateMay 14

Description

The process_version_sections function in readelf.c in GNU Binutils 2.29 allows attackers to cause a denial of service (Integer Overflow, and hang because of a time-consuming loop) or possibly have unspecified other impact via a crafted binary file with invalid values of ent.vn_next, during "readelf -a" execution.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Debiangnu/binutils< 2.29-9+3
NVDgnu/binutils2.29

🔴Vulnerability Details

3
GHSA
GHSA-7243-v7w4-2xc9: The process_version_sections function in readelf2022-05-14
OSV
CVE-2017-14333: The process_version_sections function in readelf2017-09-12
CVEList
CVE-2017-14333: The process_version_sections function in readelf2017-09-12

📋Vendor Advisories

3
Ubuntu
GNU binutils vulnerabilities2021-07-21
Red Hat
binutils: Insuficient input validation in process_version_sections function in readelf.c2017-08-29
Debian
CVE-2017-14333: binutils - The process_version_sections function in readelf.c in GNU Binutils 2.29 allows a...2017

💬Community

3
Bugzilla
CVE-2017-14333 binutils: Insuficient input validation in process_version_sections function in readelf.c2017-09-15
Bugzilla
CVE-2017-14333 binutils: Insuficient input validation in process_version_sections function in readelf.c [fedora-all]2017-09-15
Bugzilla
CVE-2017-14333 mingw-binutils: binutils: Insuficient input validation in process_version_sections function in readelf.c [epel-all]2017-09-15
CVE-2017-14333 — Integer Overflow or Wraparound | cvebase