-
Byte Open Security
(ByteOS Network)
Log In
Sign Up
Vulnerability Details :
CVE-2023-25584
Summary
Similar CVEs
Assigner
-
redhat
Assigner Org ID
-
53f830b8-0a3f-465b-8143-3b8a9948e749
Published At
-
14 Sep, 2023 | 20:50
Updated At
-
13 Feb, 2025 | 16:44
Rejected At
-
Credits
Out of bounds read in parse_module function in bfd/vms-alpha.c
An out-of-bounds read flaw was found in the parse_module function in bfd/vms-alpha.c in Binutils.
Vendors
-
Not available
Products
-
Metrics (CVSS)
Version
Base score
Base severity
Vector
Weaknesses
Attack Patterns
Solution/Workaround
References
Hyperlink
Resource Type
EPSS History
Score
Latest Score
-
N/A
Loading...
No data available for selected date range
Percentile
Latest Percentile
-
N/A
Loading...
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼
Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner
:
redhat
Assigner Org ID
:
53f830b8-0a3f-465b-8143-3b8a9948e749
Published At
:
14 Sep, 2023 | 20:50
Updated At
:
13 Feb, 2025 | 16:44
Rejected At
:
▼
CVE Numbering Authority (CNA)
Out of bounds read in parse_module function in bfd/vms-alpha.c
An out-of-bounds read flaw was found in the parse_module function in bfd/vms-alpha.c in Binutils.
Affected Products
Vendor
n/a
Product
binutils
Default Status
affected
Vendor
Red Hat, Inc.
Red Hat
Product
Red Hat Enterprise Linux 6
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
binutils
CPEs
cpe:/o:redhat:enterprise_linux:6
Default Status
affected
Vendor
Red Hat, Inc.
Red Hat
Product
Red Hat Enterprise Linux 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
binutils
CPEs
cpe:/o:redhat:enterprise_linux:7
Default Status
affected
Vendor
Red Hat, Inc.
Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
binutils
CPEs
cpe:/o:redhat:enterprise_linux:8
Default Status
affected
Vendor
Red Hat, Inc.
Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
gcc-toolset-11-binutils
CPEs
cpe:/o:redhat:enterprise_linux:8
Default Status
affected
Vendor
Red Hat, Inc.
Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
gcc-toolset-11-gdb
CPEs
cpe:/o:redhat:enterprise_linux:8
Default Status
unaffected
Vendor
Red Hat, Inc.
Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
gcc-toolset-12-binutils
CPEs
cpe:/o:redhat:enterprise_linux:8
Default Status
affected
Vendor
Red Hat, Inc.
Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
gcc-toolset-12-gdb
CPEs
cpe:/o:redhat:enterprise_linux:8
Default Status
unaffected
Vendor
Red Hat, Inc.
Red Hat
Product
Red Hat Enterprise Linux 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
binutils
CPEs
cpe:/o:redhat:enterprise_linux:9
Default Status
unaffected
Vendor
Red Hat, Inc.
Red Hat
Product
Red Hat Enterprise Linux 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
gcc-toolset-12-binutils
CPEs
cpe:/o:redhat:enterprise_linux:9
Default Status
unaffected
Vendor
Red Hat, Inc.
Red Hat
Product
Red Hat Enterprise Linux 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
gcc-toolset-12-gdb
CPEs
cpe:/o:redhat:enterprise_linux:9
Default Status
unaffected
Vendor
Fedora Project
Fedora
Product
Extra Packages for Enterprise Linux 8
Collection URL
https://packages.fedoraproject.org/
Package Name
radare2
Default Status
unaffected
Vendor
Fedora Project
Fedora
Product
Fedora 37
Collection URL
https://packages.fedoraproject.org/
Package Name
binutils
Default Status
unaffected
Vendor
Fedora Project
Fedora
Product
Fedora 36
Collection URL
https://packages.fedoraproject.org/
Package Name
radare2
Default Status
unaffected
Vendor
Fedora Project
Fedora
Product
Fedora
Collection URL
https://packages.fedoraproject.org/
Package Name
binutils
Default Status
unaffected
Vendor
Fedora Project
Fedora
Product
Extra Packages for Enterprise Linux 7
Collection URL
https://packages.fedoraproject.org/
Package Name
radare2
Default Status
unaffected
Vendor
Fedora Project
Fedora
Product
Fedora 37
Collection URL
https://packages.fedoraproject.org/
Package Name
mingw-binutils
Default Status
unaffected
Vendor
Fedora Project
Fedora
Product
Fedora 37
Collection URL
https://packages.fedoraproject.org/
Package Name
radare2
Default Status
unaffected
Vendor
Fedora Project
Fedora
Product
Fedora 36
Collection URL
https://packages.fedoraproject.org/
Package Name
insight
Default Status
unaffected
Vendor
Fedora Project
Fedora
Product
Extra Packages for Enterprise Linux 8
Collection URL
https://packages.fedoraproject.org/
Package Name
rizin
Default Status
unaffected
Vendor
Fedora Project
Fedora
Product
Fedora 36
Collection URL
https://packages.fedoraproject.org/
Package Name
binutils
Default Status
unaffected
Vendor
Fedora Project
Fedora
Product
Fedora 36
Collection URL
https://packages.fedoraproject.org/
Package Name
rizin
Default Status
unaffected
Vendor
Fedora Project
Fedora
Product
Fedora 36
Collection URL
https://packages.fedoraproject.org/
Package Name
mingw-binutils
Default Status
unaffected
Vendor
Fedora Project
Fedora
Product
Fedora 37
Collection URL
https://packages.fedoraproject.org/
Package Name
insight
Default Status
unaffected
Problem Types
Type
CWE ID
Description
CWE
CWE-125
Out-of-bounds Read
Type:
CWE
CWE ID:
CWE-125
Description:
Out-of-bounds Read
Metrics
Version
Base score
Base severity
Vector
3.1
6.3
MEDIUM
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H
Version:
3.1
Base score:
6.3
Base severity:
MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H
Metrics Other Info
Red Hat severity rating
value:
Low
namespace:
https://access.redhat.com/security/updates/classification/
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Reported to Red Hat.
2023-01-12 00:00:00
Made public.
2022-12-12 00:00:00
Event:
Reported to Red Hat.
Date:
2023-01-12 00:00:00
Event:
Made public.
Date:
2022-12-12 00:00:00
Replaced By
Rejected Reason
References
Hyperlink
Resource
https://access.redhat.com/security/cve/CVE-2023-25584
vdb-entry
x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2167467
issue-tracking
x_refsource_REDHAT
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44
N/A
https://security.netapp.com/advisory/ntap-20231103-0002/
N/A
Hyperlink:
https://access.redhat.com/security/cve/CVE-2023-25584
Resource:
vdb-entry
x_refsource_REDHAT
Hyperlink:
https://bugzilla.redhat.com/show_bug.cgi?id=2167467
Resource:
issue-tracking
x_refsource_REDHAT
Hyperlink:
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44
Resource:
N/A
Hyperlink:
https://security.netapp.com/advisory/ntap-20231103-0002/
Resource:
N/A
▼
Authorized Data Publishers (ADP)
1.
CVE Program Container
Affected Products
Metrics
Version
Base score
Base severity
Vector
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
https://access.redhat.com/security/cve/CVE-2023-25584
vdb-entry
x_refsource_REDHAT
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=2167467
issue-tracking
x_refsource_REDHAT
x_transferred
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44
x_transferred
https://security.netapp.com/advisory/ntap-20231103-0002/
x_transferred
Hyperlink:
https://access.redhat.com/security/cve/CVE-2023-25584
Resource:
vdb-entry
x_refsource_REDHAT
x_transferred
Hyperlink:
https://bugzilla.redhat.com/show_bug.cgi?id=2167467
Resource:
issue-tracking
x_refsource_REDHAT
x_transferred
Hyperlink:
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44
Resource:
x_transferred
Hyperlink:
https://security.netapp.com/advisory/ntap-20231103-0002/
Resource:
x_transferred
2.
CISA ADP Vulnrichment
Affected Products
Metrics
Version
Base score
Base severity
Vector
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
Information is not available yet
▼
National Vulnerability Database (NVD)
nvd.nist.gov
Source
:
secalert@redhat.com
Published At
:
14 Sep, 2023 | 21:15
Updated At
:
23 Feb, 2024 | 18:51
An out-of-bounds read flaw was found in the parse_module function in bfd/vms-alpha.c in Binutils.
CISA Catalog
Date Added
Due Date
Vulnerability Name
Required Action
N/A
Date Added:
N/A
Due Date:
N/A
Vulnerability Name:
N/A
Required Action:
N/A
Metrics
Type
Version
Base score
Base severity
Vector
Primary
3.1
7.1
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
Secondary
3.1
6.3
MEDIUM
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H
Type:
Primary
Version:
3.1
Base score:
7.1
Base severity:
HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
Type:
Secondary
Version:
3.1
Base score:
6.3
Base severity:
MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H
CPE Matches
GNU
gnu
>>
binutils
>>
Versions before 2.40(exclusive)
cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
Load More
Weaknesses
CWE ID
Type
Source
CWE-125
Primary
nvd@nist.gov
CWE-125
Secondary
secalert@redhat.com
CWE ID:
CWE-125
Type:
Primary
Source:
nvd@nist.gov
CWE ID:
CWE-125
Type:
Secondary
Source:
secalert@redhat.com
Evaluator Description
Evaluator Impact
Evaluator Solution
Vendor Statements
References
Hyperlink
Source
Resource
https://access.redhat.com/security/cve/CVE-2023-25584
secalert@redhat.com
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2167467
secalert@redhat.com
Issue Tracking
Patch
https://security.netapp.com/advisory/ntap-20231103-0002/
secalert@redhat.com
Third Party Advisory
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44
secalert@redhat.com
Mailing List
Patch
Hyperlink:
https://access.redhat.com/security/cve/CVE-2023-25584
Source:
secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink:
https://bugzilla.redhat.com/show_bug.cgi?id=2167467
Source:
secalert@redhat.com
Resource:
Issue Tracking
Patch
Hyperlink:
https://security.netapp.com/advisory/ntap-20231103-0002/
Source:
secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink:
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44
Source:
secalert@redhat.com
Resource:
Mailing List
Patch
Change History
0
Information is not available yet
Similar CVEs
0
Records found
Details not found