Description
The dump_relocs_in_section function in objdump.c in GNU Binutils 2.29.1 does not check for reloc count integer overflows, which allows remote attackers to cause a denial of service (excessive memory allocation, or heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PE file.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-8288 | The dump_relocs_in_section function in objdump.c in GNU Binutils 2.29.1 does not check for reloc count integer overflows, which allows remote attackers to cause a denial of service (excessive memory allocation, or heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PE file. |
Ubuntu USN |
USN-5341-1 | GNU binutils vulnerabilities |
Ubuntu USN |
USN-6413-1 | GNU binutils vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:43:59.829Z
Reserved: 2017-12-04T00:00:00.000Z
Link: CVE-2017-17122
No data.
Status : Modified
Published: 2017-12-04T08:29:00.513
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-17122
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN