CVE-2017-7608Out-of-bounds Read in Project Elfutils

Severity
5.5MEDIUMNVD
EPSS
0.5%
top 35.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 9
Latest updateMay 13

Description

The ebl_object_note_type_name function in eblobjnotetypename.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

Also affects: Debian Linux 8.0, Ubuntu Linux 14.04, 16.04

Patches

🔴Vulnerability Details

3
GHSA
GHSA-64xp-m6w3-x4fw: The ebl_object_note_type_name function in eblobjnotetypename2022-05-13
CVEList
CVE-2017-7608: The ebl_object_note_type_name function in eblobjnotetypename2017-04-09
OSV
CVE-2017-7608: The ebl_object_note_type_name function in eblobjnotetypename2017-04-09

📋Vendor Advisories

3
Ubuntu
elfutils vulnerabilities2018-06-05
Red Hat
elfutils: Heap-buffer overflow in the ebl_object_note_type_name function2017-04-04
Debian
CVE-2017-7608: elfutils - The ebl_object_note_type_name function in eblobjnotetypename.c in elfutils 0.168...2017

💬Community

2
Bugzilla
CVE-2017-7607 CVE-2017-7608 CVE-2017-7609 CVE-2017-7610 CVE-2017-7611 CVE-2017-7612 CVE-2017-7613 elfutils: various flaws [fedora-all]2017-04-12
Bugzilla
CVE-2017-7608 elfutils: Heap-buffer overflow in the ebl_object_note_type_name function2017-04-12
CVE-2017-7608 — Out-of-bounds Read in Project Elfutils | cvebase