Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-9750Improper Restriction of Operations within the Bounds of a Memory Buffer in Binutils

Severity
7.8HIGHNVD
EPSS
2.4%
top 14.95%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 19
Latest updateAug 9

Description

opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Debiangnu/binutils< 2.29-1+3
NVDgnu/binutils2.28

Patches

🔴Vulnerability Details

3
GHSA
GHSA-9wwg-6rwx-49mw: opcodes/rx-decode2022-05-14
CVEList
CVE-2017-9750: opcodes/rx-decode2017-06-19
OSV
CVE-2017-9750: opcodes/rx-decode2017-06-19

💥Exploits & PoCs

1
Exploit-DB
GNU binutils - 'rx_decode_opcode' Buffer Overflow2017-06-19

📋Vendor Advisories

4
Ubuntu
GNU binutils vulnerabilities2023-08-09
Ubuntu
GNU binutils vulnerabilities2021-07-21
Red Hat
binutils: Global buffer over-read in opcodes/rx-decode.opc when disassembling a corrupt RX binary2017-07-11
Debian
CVE-2017-9750: binutils - opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale...2017

💬Community

3
Bugzilla
CVE-2017-9750 binutils: stack overflow in opcodes/rx-decode.opc [fedora-all]2017-07-11
Bugzilla
CVE-2017-9750 mingw-binutils: binutils: stack overflow in opcodes/rx-decode.opc [epel-all]2017-07-11
Bugzilla
CVE-2017-9750 binutils: Global buffer over-read in opcodes/rx-decode.opc when disassembling a corrupt RX binary2017-07-11
CVE-2017-9750 — GNU Binutils vulnerability | cvebase