4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.9 Medium
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
43.8%
An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack.
CPE | Name | Operator | Version |
---|---|---|---|
elfutils_project:elfutils | elfutils project elfutils | eq | 0.175 |
lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
access.redhat.com/errata/RHSA-2019:2197
access.redhat.com/errata/RHSA-2019:3575
lists.debian.org/debian-lts-announce/2019/02/msg00036.html
lists.debian.org/debian-lts-announce/2021/10/msg00030.html
sourceware.org/bugzilla/show_bug.cgi?id=24103
sourceware.org/ml/elfutils-devel/2019-q1/msg00070.html
usn.ubuntu.com/4012-1/
4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.9 Medium
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
43.8%