CVE-2017-7227

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.

References

http://www.securityfocus.com/bid/97209

https://security.gentoo.org/glsa/201801-01

https://sourceware.org/bugzilla/show_bug.cgi?id=20906

Details

Source: MITRE

Published: 2017-03-22

Updated: 2018-01-09

Type: CWE-119

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*

Tenable Plugins

View all (6 total)

IDNameProductFamilySeverity
151919Ubuntu 16.04 LTS : GNU binutils vulnerabilities (USN-4336-2)NessusUbuntu Local Security Checks
critical
132275EulerOS 2.0 SP3 : binutils (EulerOS-SA-2019-2558)NessusHuawei Local Security Checks
critical
131604EulerOS 2.0 SP2 : binutils (EulerOS-SA-2019-2450)NessusHuawei Local Security Checks
critical
105627GLSA-201801-01 : Binutils: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
105225openSUSE Security Update : binutils (openSUSE-2017-1330)NessusSuSE Local Security Checks
critical
104968SUSE SLED12 / SLES12 Security Update : binutils (SUSE-SU-2017:3170-1)NessusSuSE Local Security Checks
critical