GNU Binutils 2.43/2.44 objdump binutils/bucomm.c display_info Kari na aiki

Gaskiya vulnerability da aka ware a matsayin karshewa an samu a GNU Binutils 2.43/2.44. Hakika, aikin display_info ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil binutils/bucomm.c, a cikin sashen objdump. A sa manipulation ka Kari na aiki. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-401. Hakika, rauni an bayyana shi 04/03/2025 kamar 32716. An raba bayanin tsaro don saukewa a sourceware.org. Wannan matsala ana saninta da CVE-2025-3198. Wuroo ka a yiɗi a yi ɗum e laawol gese. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga sourceware.org. 0-day shima, an ndiyam a wuro be $0-$5k. Ana kiran patch ɗin da ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. An tanadi gyaran matsalar don saukewa a sourceware.org. Ana shawartar a saka patch domin warware wannan matsala. Wannan vulnerability an kuma samu a wasu kundin bayanan vulnerability: Tenable (249290). Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

5 Goyarwa · 101 Datenpunkte

FurɗeSúgá
04/03/2025 13:19
Gargadi 1/4
04/04/2025 12:11
Gargadi 2/4
04/04/2025 14:13
Gargadi 3/4
08/15/2025 15:17
Gargadi 4/4
10/30/2025 12:16
software_vendorGNUGNUGNUGNUGNU
software_nameBinutilsBinutilsBinutilsBinutilsBinutils
software_version2.43/2.442.43/2.442.43/2.442.43/2.442.43/2.44
software_componentobjdumpobjdumpobjdumpobjdumpobjdump
software_filebinutils/bucomm.cbinutils/bucomm.cbinutils/bucomm.cbinutils/bucomm.cbinutils/bucomm.c
software_functiondisplay_infodisplay_infodisplay_infodisplay_infodisplay_info
vulnerability_cweCWE-401 (Kari na aiki)CWE-401 (Kari na aiki)CWE-401 (Kari na aiki)CWE-401 (Kari na aiki)CWE-401 (Kari na aiki)
vulnerability_risk11111
cvss3_vuldb_avLLLLL
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iNNNNN
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rlOOOOO
cvss3_vuldb_rcCCCCC
advisory_identifier3271632716327163271632716
advisory_urlhttps://sourceware.org/bugzilla/show_bug.cgi?id=32716https://sourceware.org/bugzilla/show_bug.cgi?id=32716https://sourceware.org/bugzilla/show_bug.cgi?id=32716https://sourceware.org/bugzilla/show_bug.cgi?id=32716https://sourceware.org/bugzilla/show_bug.cgi?id=32716
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0
countermeasure_nameKariKariKariKariKari
patch_nameba6ad3a18cb26b79e0e3b84c39f707535bbc344dba6ad3a18cb26b79e0e3b84c39f707535bbc344dba6ad3a18cb26b79e0e3b84c39f707535bbc344dba6ad3a18cb26b79e0e3b84c39f707535bbc344dba6ad3a18cb26b79e0e3b84c39f707535bbc344d
countermeasure_patch_urlhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344dhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344dhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344dhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344dhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d
source_cveCVE-2025-3198CVE-2025-3198CVE-2025-3198CVE-2025-3198CVE-2025-3198
cna_responsibleVulDBVulDBVulDBVulDBVulDB
software_typeProgramming Tool SoftwareProgramming Tool SoftwareProgramming Tool SoftwareProgramming Tool SoftwareProgramming Tool Software
cvss2_vuldb_avLLLLL
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiNNNNN
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcCCCCC
cvss2_vuldb_rlOFOFOFOFOF
cvss4_vuldb_avLLLLL
cvss4_vuldb_acLLLLL
cvss4_vuldb_prLLLLL
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viNNNNN
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore1.71.71.71.71.7
cvss2_vuldb_tempscore1.31.31.31.31.3
cvss3_vuldb_basescore3.33.33.33.33.3
cvss3_vuldb_tempscore3.03.03.03.03.0
cvss3_meta_basescore3.33.33.33.33.3
cvss3_meta_tempscore3.03.13.13.13.1
cvss4_vuldb_bscore4.84.84.84.84.8
cvss4_vuldb_btscore1.91.91.91.91.9
advisory_date1743631200 (04/03/2025)1743631200 (04/03/2025)1743631200 (04/03/2025)1743631200 (04/03/2025)1743631200 (04/03/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.
cvss4_cna_avLLLL
cvss4_cna_acLLLL
cvss4_cna_atNNNN
cvss4_cna_prLLLL
cvss4_cna_uiNNNN
cvss4_cna_vcNNNN
cvss4_cna_viNNNN
cvss4_cna_vaLLLL
cvss4_cna_scNNNN
cvss4_cna_siNNNN
cvss4_cna_saNNNN
cvss4_cna_bscore4.84.84.84.8
cvss3_cna_avLLLL
cvss3_cna_acLLLL
cvss3_cna_prLLLL
cvss3_cna_uiNNNN
cvss3_cna_sUUUU
cvss3_cna_cNNNN
cvss3_cna_iNNNN
cvss3_cna_aLLLL
cvss3_cna_basescore3.33.33.33.3
cvss2_cna_avLLLL
cvss2_cna_acLLLL
cvss2_cna_auSSSS
cvss2_cna_ciNNNN
cvss2_cna_iiNNNN
cvss2_cna_aiPPPP
cvss2_cna_basescore1.71.71.71.7
cve_nvd_summaryesSe ha encontrado una vulnerabilidad en GNU Binutils 2.43/2.44, clasificada como problemática. Esta vulnerabilidad afecta a la función display_info del archivo binutils/bucomm.c del componente objdump. Esta manipulación provoca una fuga de memoria. Es necesario implementar un ataque localmente. Se ha hecho público el exploit y puede que sea utilizado. El parche se llama ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. Se recomienda aplicar un parche para solucionar este problema.Se ha encontrado una vulnerabilidad en GNU Binutils 2.43/2.44, clasificada como problemática. Esta vulnerabilidad afecta a la función display_info del archivo binutils/bucomm.c del componente objdump. Esta manipulación provoca una fuga de memoria. Es necesario implementar un ataque localmente. Se ha hecho público el exploit y puede que sea utilizado. El parche se llama ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. Se recomienda aplicar un parche para solucionar este problema.Se ha encontrado una vulnerabilidad en GNU Binutils 2.43/2.44, clasificada como problemática. Esta vulnerabilidad afecta a la función display_info del archivo binutils/bucomm.c del componente objdump. Esta manipulación provoca una fuga de memoria. Es necesario implementar un ataque localmente. Se ha hecho público el exploit y puede que sea utilizado. El parche se llama ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. Se recomienda aplicar un parche para solucionar este problema.
nessus_id249290249290
nessus_nameEulerOS 2.0 SP11 : binutils (EulerOS-SA-2025-1921)EulerOS 2.0 SP11 : binutils (EulerOS-SA-2025-1921)
certbund_widWID-SEC-2025-0709
certbund_classification1
certbund_published1761818603 (10/30/2025)
certbund_titlebinutils: Schwachstelle ermöglicht Offenlegung von Informationen
certbund_productsUbuntu Linux Open Source binutils
certbund_basescore3.3
certbund_nopatch0

Want to stay up to date on a daily basis?

Enable the mail alert feature now!