CVE-2017-7227Improper Restriction of Operations within the Bounds of a Memory Buffer in Binutils

Severity
7.5HIGHNVD
EPSS
0.4%
top 36.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 22
Latest updateMay 14

Description

GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

Debiangnu/binutils< 2.27.51.20161212-1+3
NVDgnu/binutils2.28

Patches

🔴Vulnerability Details

3
GHSA
GHSA-xgmh-4vh7-2fjj: GNU linker (ld) in GNU Binutils 22022-05-14
CVEList
CVE-2017-7227: GNU linker (ld) in GNU Binutils 22017-03-22
OSV
CVE-2017-7227: GNU linker (ld) in GNU Binutils 22017-03-22

📋Vendor Advisories

3
Ubuntu
GNU binutils vulnerabilities2021-07-21
Debian
CVE-2017-7227: binutils - GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overfl...2017
Red Hat
binutils: Heap-based buffer overflow in ld due to missing null termination2016-12-02

💬Community

1
Bugzilla
CVE-2017-7227 binutils: Heap-based buffer overflow in ld due to missing null termination2017-03-23
CVE-2017-7227 — GNU Binutils vulnerability | cvebase