CVE-2017-9744Improper Restriction of Operations within the Bounds of a Memory Buffer in Binutils

Severity
7.8HIGHNVD
EPSS
1.1%
top 21.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 19
Latest updateMay 17

Description

The sh_elf_set_mach_from_flags function in bfd/elf32-sh.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Debiangnu/binutils< 2.29-1+3
NVDgnu/binutils2.28

Patches

🔴Vulnerability Details

3
GHSA
GHSA-qx5m-4cxj-24g7: The sh_elf_set_mach_from_flags function in bfd/elf32-sh2022-05-17
OSV
CVE-2017-9744: The sh_elf_set_mach_from_flags function in bfd/elf32-sh2017-06-19
CVEList
CVE-2017-9744: The sh_elf_set_mach_from_flags function in bfd/elf32-sh2017-06-19

📋Vendor Advisories

3
Ubuntu
GNU binutils vulnerabilities2021-07-21
Red Hat
binutils: Address violation in sh_elf_set_mach_from_flags function when disassembling a corrupt SH binary2017-07-11
Debian
CVE-2017-9744: binutils - The sh_elf_set_mach_from_flags function in bfd/elf32-sh.c in the Binary File Des...2017

💬Community

3
Bugzilla
CVE-2017-9744 mingw-binutils: binutils: stack overflow in sh_elf_set_mach_from_flags function [epel-all]2017-07-11
Bugzilla
CVE-2017-9744 binutils: Address violation in sh_elf_set_mach_from_flags function when disassembling a corrupt SH binary2017-07-11
Bugzilla
CVE-2017-9744 binutils: stack overflow in sh_elf_set_mach_from_flags function [fedora-all]2017-07-11
CVE-2017-9744 — GNU Binutils vulnerability | cvebase