Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code.
http://www.ubuntu.com/usn/usn-336-1
http://secunia.com/advisories/21530
http://secunia.com/advisories/21508
http://bugs.gentoo.org/show_bug.cgi?id=99464
http://www.vupen.com/english/advisories/2006/3307
Source: Mitre, NVD
Published: 2005-12-31
Updated: 2025-04-03
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS: 0.20695