GNU BinUtils 2.1x Buffer Overflow Vulnerabilit
Reporter | Title | Published | Views | Family All 13 |
---|---|---|---|---|
OpenVAS | SLES9: Security update for binutils | 10 Oct 200900:00 | – | openvas |
OpenVAS | Ubuntu: Security Advisory (USN-292-1) | 26 Aug 202200:00 | – | openvas |
OpenVAS | SLES9: Security update for binutils | 10 Oct 200900:00 | – | openvas |
CVE | CVE-2006-2362 | 15 May 200616:06 | – | cve |
NVD | CVE-2006-2362 | 15 May 200616:06 | – | nvd |
Vulnrichment | CVE-2006-2362 | 15 May 200616:00 | – | vulnrichment |
Cvelist | CVE-2006-2362 | 15 May 200616:00 | – | cvelist |
Debian CVE | CVE-2006-2362 | 15 May 200616:06 | – | debiancve |
UbuntuCve | CVE-2006-2362 | 15 May 200600:00 | – | ubuntucve |
Prion | Buffer overflow | 15 May 200616:06 | – | prion |
source: https://www.securityfocus.com/bid/17950/info
GNU 'binutils' is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.
Remote attackers may crash the 'strings' utility, potentially making analysis of malicious binaries more difficult. Attackers may also execute arbitrary machine code in the context of applications that use the affected library.
%253Cc%253Cc%253Cc%253Cc%253Cc%253Cc%253Cc
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo