Lucene search

K

GNU BinUtils 2.1x - Buffer Overflow

🗓️ 11 May 2006 00:00:00Reported by Jesus Olmos GonzalezType 
exploitdb
 exploitdb
🔗 www.exploit-db.com👁 20 Views

GNU BinUtils 2.1x Buffer Overflow Vulnerabilit

Show more
Related
Code
ReporterTitlePublishedViews
Family
OpenVAS
SLES9: Security update for binutils
10 Oct 200900:00
openvas
OpenVAS
Ubuntu: Security Advisory (USN-292-1)
26 Aug 202200:00
openvas
OpenVAS
SLES9: Security update for binutils
10 Oct 200900:00
openvas
CVE
CVE-2006-2362
15 May 200616:06
cve
NVD
CVE-2006-2362
15 May 200616:06
nvd
Vulnrichment
CVE-2006-2362
15 May 200616:00
vulnrichment
Cvelist
CVE-2006-2362
15 May 200616:00
cvelist
Debian CVE
CVE-2006-2362
15 May 200616:06
debiancve
UbuntuCve
CVE-2006-2362
15 May 200600:00
ubuntucve
Prion
Buffer overflow
15 May 200616:06
prion
Rows per page
source: https://www.securityfocus.com/bid/17950/info

GNU 'binutils' is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

Remote attackers may crash the 'strings' utility, potentially making analysis of malicious binaries more difficult. Attackers may also execute arbitrary machine code in the context of applications that use the affected library.

%253Cc%253Cc%253Cc%253Cc%253Cc%253Cc%253Cc

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
11 May 2006 00:00Current
7.4High risk
Vulners AI Score7.4
EPSS0.025
20
.json
Report