Description
The libcpu component which is used by libasm of elfutils version 0.177 (git 47780c9e), suffers from denial-of-service vulnerability caused by application crashes due to out-of-bounds write (CWE-787), off-by-one error (CWE-193) and reachable assertion (CWE-617); to exploit the vulnerability, the attackers need to craft certain ELF files which bypass the missing bound checks.
Published: 2023-08-22
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3579-1 elfutils security update
EUVD EUVD EUVD-2020-13826 The libcpu component which is used by libasm of elfutils version 0.177 (git 47780c9e), suffers from denial-of-service vulnerability caused by application crashes due to out-of-bounds write (CWE-787), off-by-one error (CWE-193) and reachable assertion (CWE-617); to exploit the vulnerability, the attackers need to craft certain ELF files which bypass the missing bound checks.
Ubuntu USN Ubuntu USN USN-6322-1 elfutils vulnerabilities
History

Mon, 07 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Elfutils Project Elfutils
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-10-07T15:41:01.120Z

Reserved: 2020-08-13T00:00:00.000Z

Link: CVE-2020-21047

cve-icon Vulnrichment

Updated: 2024-08-04T14:22:25.620Z

cve-icon NVD

Status : Modified

Published: 2023-08-22T19:16:09.657

Modified: 2024-11-21T05:12:23.310

Link: CVE-2020-21047

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses