Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-9749Improper Restriction of Operations within the Bounds of a Memory Buffer in Binutils

Severity
7.8HIGHNVD
EPSS
4.3%
top 11.17%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 19
Latest updateMay 14

Description

The *regs* macros in opcodes/bfin-dis.c in GNU Binutils 2.28 allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Debiangnu/binutils< 2.29-1+3
NVDgnu/binutils2.28

Patches

🔴Vulnerability Details

3
GHSA
GHSA-gvw5-9j82-5gf9: The *regs* macros in opcodes/bfin-dis2022-05-14
CVEList
CVE-2017-9749: The *regs* macros in opcodes/bfin-dis2017-06-19
OSV
CVE-2017-9749: The *regs* macros in opcodes/bfin-dis2017-06-19

💥Exploits & PoCs

1
Exploit-DB
GNU binutils - 'decode_pseudodbg_assert_0' Buffer Overflow2017-06-19

📋Vendor Advisories

3
Ubuntu
GNU binutils vulnerabilities2021-07-21
Red Hat
binutils: Global buffer over-read in *regs* macros when disassembling corrupt bfin binary2017-07-11
Debian
CVE-2017-9749: binutils - The *regs* macros in opcodes/bfin-dis.c in GNU Binutils 2.28 allow remote attack...2017

💬Community

3
Bugzilla
CVE-2017-9749 binutils: Global buffer over-read in *regs* macros when disassembling corrupt bfin binary2017-07-11
Bugzilla
CVE-2017-9749 binutils: stack overflow in *regs* macros [fedora-all]2017-07-11
Bugzilla
CVE-2017-9749 mingw-binutils: binutils: stack overflow in *regs* macros [epel-all]2017-07-11
CVE-2017-9749 — GNU Binutils vulnerability | cvebase