Buffer overflow in getsym in tekhex.c in libbfd in Free Software Foundation GNU Binutils before 20060423, as used by GNU strings, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a file with a crafted Tektronix Hex Format (TekHex) record in which the length character is not a valid hexadecimal character.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Buffer overflow in getsym in tekhex.c in libbfd in Free Software Foundation GNU Binutils before 20060423, as used by GNU strings, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a file with a crafted Tektronix Hex Format (TekHex) record in which the length character is not a valid hexadecimal character.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Version | Base score | Base severity | Vector |
---|---|---|---|
3.1 | 7.3 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|
Buffer overflow in getsym in tekhex.c in libbfd in Free Software Foundation GNU Binutils before 20060423, as used by GNU strings, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a file with a crafted Tektronix Hex Format (TekHex) record in which the length character is not a valid hexadecimal character.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Secondary | 3.1 | 7.3 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
Primary | 2.0 | 7.5 | HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
Hyperlink | Source | Resource |
---|---|---|
http://lists.apple.com/archives/security-announce/2007/Oct/msg00001.html | cve@mitre.org | Mailing List Third Party Advisory |
http://secunia.com/advisories/20188 | cve@mitre.org | Third Party Advisory |
http://secunia.com/advisories/20531 | cve@mitre.org | Third Party Advisory |
http://secunia.com/advisories/20550 | cve@mitre.org | Third Party Advisory |
http://secunia.com/advisories/22932 | cve@mitre.org | Third Party Advisory |
http://secunia.com/advisories/27441 | cve@mitre.org | Third Party Advisory |
http://sourceware.org/bugzilla/show_bug.cgi?id=2584 | cve@mitre.org | Exploit Issue Tracking Third Party Advisory |
http://www.mail-archive.com/bug-binutils%40gnu.org/msg01516.html | cve@mitre.org | Issue Tracking Mailing List |
http://www.novell.com/linux/security/advisories/2006_26_sr.html | cve@mitre.org | Third Party Advisory |
http://www.securityfocus.com/bid/17950 | cve@mitre.org | Exploit Patch Third Party Advisory VDB Entry |
http://www.securitytracker.com/id?1018872 | cve@mitre.org | Third Party Advisory VDB Entry |
http://www.trustix.org/errata/2006/0034/ | cve@mitre.org | Broken Link |
http://www.ubuntu.com/usn/usn-292-1 | cve@mitre.org | Broken Link |
http://www.vupen.com/english/advisories/2006/1924 | cve@mitre.org | Permissions Required |
http://www.vupen.com/english/advisories/2007/3665 | cve@mitre.org | Permissions Required |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26644 | cve@mitre.org | Third Party Advisory VDB Entry |
http://lists.apple.com/archives/security-announce/2007/Oct/msg00001.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://secunia.com/advisories/20188 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://secunia.com/advisories/20531 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://secunia.com/advisories/20550 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://secunia.com/advisories/22932 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://secunia.com/advisories/27441 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://sourceware.org/bugzilla/show_bug.cgi?id=2584 | af854a3a-2127-422b-91ae-364da2661108 | Exploit Issue Tracking Third Party Advisory |
http://www.mail-archive.com/bug-binutils%40gnu.org/msg01516.html | af854a3a-2127-422b-91ae-364da2661108 | Issue Tracking Mailing List |
http://www.novell.com/linux/security/advisories/2006_26_sr.html | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.securityfocus.com/bid/17950 | af854a3a-2127-422b-91ae-364da2661108 | Exploit Patch Third Party Advisory VDB Entry |
http://www.securitytracker.com/id?1018872 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
http://www.trustix.org/errata/2006/0034/ | af854a3a-2127-422b-91ae-364da2661108 | Broken Link |
http://www.ubuntu.com/usn/usn-292-1 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link |
http://www.vupen.com/english/advisories/2006/1924 | af854a3a-2127-422b-91ae-364da2661108 | Permissions Required |
http://www.vupen.com/english/advisories/2007/3665 | af854a3a-2127-422b-91ae-364da2661108 | Permissions Required |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26644 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |