Bug 1524510 (CVE-2017-17124) - CVE-2017-17124 binutils: Heap buffer overflow in the _bfd_coff_read_string_table function
Summary: CVE-2017-17124 binutils: Heap buffer overflow in the _bfd_coff_read_string_ta...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2017-17124
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1499310 1499311
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-12-11 15:55 UTC by Andrej Nemec
Modified: 2019-09-29 14:28 UTC (History)
15 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-06-08 03:33:21 UTC
Embargoed:


Attachments (Terms of Use)

Description Andrej Nemec 2017-12-11 15:55:08 UTC
The _bfd_coff_read_string_table function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not properly validate the size of the external string table, which allows remote attackers to cause a denial of service (excessive memory consumption, or heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted COFF binary.

Upstream issue:

https://sourceware.org/bugzilla/show_bug.cgi?id=22507

Upstream patches:

https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b0029dce6867de1a2828293177b0e030d2f0f03c

Comment 1 Andrej Nemec 2017-12-11 15:58:10 UTC
Created binutils tracking bugs for this issue:

Affects: fedora-all [bug 1499311]


Created mingw-binutils tracking bugs for this issue:

Affects: epel-all [bug 1499310]


Note You need to log in before you can comment on or make changes to this bug.