Description
Buffer overflow in the do_type function in cplus-dem.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-552-1 | binutils security update |
EUVD |
EUVD-2016-5479 | Buffer overflow in the do_type function in cplus-dem.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary. |
Ubuntu USN |
USN-3337-1 | Valgrind vulnerabilities |
Ubuntu USN |
USN-3367-1 | gdb vulnerabilities |
Ubuntu USN |
USN-3368-1 | libiberty vulnerabilities |
Ubuntu USN |
USN-4336-2 | GNU binutils vulnerabilities |
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T00:32:25.859Z
Reserved: 2016-05-05T00:00:00.000Z
Link: CVE-2016-4492
No data.
Status : Modified
Published: 2017-02-24T20:59:00.563
Modified: 2026-05-13T00:24:29.033
Link: CVE-2016-4492
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN