Lucene search

K
f5F5F5:K38336243
HistoryMar 25, 2019 - 12:00 a.m.

K38336243 : Binutils vulnerabilities CVE-2018-20623, CVE-2018-20651, and CVE-2018-20712

2019-03-2500:00:00
my.f5.com
16

6.2 Medium

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.3%

Security Advisory Description

In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.

A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.

A heap-based buffer over-read exists in the function d_expression_1 in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31.1. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by c++filt.

Impact

There is no impact; F5 products are not affected by this vulnerability.