GNU Binutils 2.43/2.44 objdump binutils/bucomm.c display_info ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ

Rakkoon nageenyaa kan ସମସ୍ୟାଜନକ jedhamuun beekamu GNU Binutils 2.43/2.44 keessatti argameera. Miidhaan irra gahe is hojii display_info faayilii binutils/bucomm.c keessa kutaa objdump keessa. Dhugumatti jijjiirraa gara ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ geessa. Waliigalteewwan CWE fayyadamuun rakkoo ibsuun gara CWE-401 si geessa. Beekumsi kun yeroo 04/03/2025 ifoomsifameera akka 32716. Odeeffannoon kun buufachuuf sourceware.org irratti dhiyaateera. Dogoggorri kun maqaa CVE-2025-3198 jedhuun tajaajilama. Weerara sun bakka dhuunfaatti qofa raawwatamuu danda'a. Odeeffannoon teeknikaa ni argama. Akka dabalataan, meeshaa balaa kana fayyadamuuf argama. Qorannoo miidhaa (exploit) beeksifamee jira, namoonni itti fayyadamuu danda'u. Yeroo ammaa, gatii exploit might be approx. USD $0-$5k beekamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee murtaa’eera. Exploit kana sourceware.org irraa buufachuu ni dandeessa. Waggaa 0-day ta'ee, gatiin isaa daldala dhoksaa keessatti $0-$5k jedhamee tilmaamame. Maqa-balleessaa paachii ba6ad3a18cb26b79e0e3b84c39f707535bbc344d jedhama. Sirreeffamni rakkoo sourceware.org irratti buufachuuf jira. Paachii fe'uun rakkoo kana furuuf ni gorfama. Hanqinni kun bu'uuraalee odeeffannoo hanqina biroo keessatti illee galmaa'ee jira: Tenable (249290). Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

5 ଆଡାପ୍ଟେସନ୍ · 101 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
04/03/2025 01:19 PM
ଅଦ୍ୟତନ 1/4
04/04/2025 12:11 PM
ଅଦ୍ୟତନ 2/4
04/04/2025 02:13 PM
ଅଦ୍ୟତନ 3/4
08/15/2025 03:17 PM
ଅଦ୍ୟତନ 4/4
10/30/2025 12:16 PM
software_vendorGNUGNUGNUGNUGNU
software_nameBinutilsBinutilsBinutilsBinutilsBinutils
software_version2.43/2.442.43/2.442.43/2.442.43/2.442.43/2.44
software_componentobjdumpobjdumpobjdumpobjdumpobjdump
software_filebinutils/bucomm.cbinutils/bucomm.cbinutils/bucomm.cbinutils/bucomm.cbinutils/bucomm.c
software_functiondisplay_infodisplay_infodisplay_infodisplay_infodisplay_info
vulnerability_cweCWE-401 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-401 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-401 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-401 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-401 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)
vulnerability_risk11111
cvss3_vuldb_avLLLLL
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iNNNNN
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rlOOOOO
cvss3_vuldb_rcCCCCC
advisory_identifier3271632716327163271632716
advisory_urlhttps://sourceware.org/bugzilla/show_bug.cgi?id=32716https://sourceware.org/bugzilla/show_bug.cgi?id=32716https://sourceware.org/bugzilla/show_bug.cgi?id=32716https://sourceware.org/bugzilla/show_bug.cgi?id=32716https://sourceware.org/bugzilla/show_bug.cgi?id=32716
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0
countermeasure_nameପ୍ୟାଚ୍ପ୍ୟାଚ୍ପ୍ୟାଚ୍ପ୍ୟାଚ୍ପ୍ୟାଚ୍
patch_nameba6ad3a18cb26b79e0e3b84c39f707535bbc344dba6ad3a18cb26b79e0e3b84c39f707535bbc344dba6ad3a18cb26b79e0e3b84c39f707535bbc344dba6ad3a18cb26b79e0e3b84c39f707535bbc344dba6ad3a18cb26b79e0e3b84c39f707535bbc344d
countermeasure_patch_urlhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344dhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344dhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344dhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344dhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d
source_cveCVE-2025-3198CVE-2025-3198CVE-2025-3198CVE-2025-3198CVE-2025-3198
cna_responsibleVulDBVulDBVulDBVulDBVulDB
software_typeProgramming Tool SoftwareProgramming Tool SoftwareProgramming Tool SoftwareProgramming Tool SoftwareProgramming Tool Software
cvss2_vuldb_avLLLLL
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiNNNNN
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcCCCCC
cvss2_vuldb_rlOFOFOFOFOF
cvss4_vuldb_avLLLLL
cvss4_vuldb_acLLLLL
cvss4_vuldb_prLLLLL
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viNNNNN
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore1.71.71.71.71.7
cvss2_vuldb_tempscore1.31.31.31.31.3
cvss3_vuldb_basescore3.33.33.33.33.3
cvss3_vuldb_tempscore3.03.03.03.03.0
cvss3_meta_basescore3.33.33.33.33.3
cvss3_meta_tempscore3.03.13.13.13.1
cvss4_vuldb_bscore4.84.84.84.84.8
cvss4_vuldb_btscore1.91.91.91.91.9
advisory_date1743631200 (04/03/2025)1743631200 (04/03/2025)1743631200 (04/03/2025)1743631200 (04/03/2025)1743631200 (04/03/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.
cvss4_cna_avLLLL
cvss4_cna_acLLLL
cvss4_cna_atNNNN
cvss4_cna_prLLLL
cvss4_cna_uiNNNN
cvss4_cna_vcNNNN
cvss4_cna_viNNNN
cvss4_cna_vaLLLL
cvss4_cna_scNNNN
cvss4_cna_siNNNN
cvss4_cna_saNNNN
cvss4_cna_bscore4.84.84.84.8
cvss3_cna_avLLLL
cvss3_cna_acLLLL
cvss3_cna_prLLLL
cvss3_cna_uiNNNN
cvss3_cna_sUUUU
cvss3_cna_cNNNN
cvss3_cna_iNNNN
cvss3_cna_aLLLL
cvss3_cna_basescore3.33.33.33.3
cvss2_cna_avLLLL
cvss2_cna_acLLLL
cvss2_cna_auSSSS
cvss2_cna_ciNNNN
cvss2_cna_iiNNNN
cvss2_cna_aiPPPP
cvss2_cna_basescore1.71.71.71.7
cve_nvd_summaryesSe ha encontrado una vulnerabilidad en GNU Binutils 2.43/2.44, clasificada como problemática. Esta vulnerabilidad afecta a la función display_info del archivo binutils/bucomm.c del componente objdump. Esta manipulación provoca una fuga de memoria. Es necesario implementar un ataque localmente. Se ha hecho público el exploit y puede que sea utilizado. El parche se llama ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. Se recomienda aplicar un parche para solucionar este problema.Se ha encontrado una vulnerabilidad en GNU Binutils 2.43/2.44, clasificada como problemática. Esta vulnerabilidad afecta a la función display_info del archivo binutils/bucomm.c del componente objdump. Esta manipulación provoca una fuga de memoria. Es necesario implementar un ataque localmente. Se ha hecho público el exploit y puede que sea utilizado. El parche se llama ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. Se recomienda aplicar un parche para solucionar este problema.Se ha encontrado una vulnerabilidad en GNU Binutils 2.43/2.44, clasificada como problemática. Esta vulnerabilidad afecta a la función display_info del archivo binutils/bucomm.c del componente objdump. Esta manipulación provoca una fuga de memoria. Es necesario implementar un ataque localmente. Se ha hecho público el exploit y puede que sea utilizado. El parche se llama ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. Se recomienda aplicar un parche para solucionar este problema.
nessus_id249290249290
nessus_nameEulerOS 2.0 SP11 : binutils (EulerOS-SA-2025-1921)EulerOS 2.0 SP11 : binutils (EulerOS-SA-2025-1921)
certbund_widWID-SEC-2025-0709
certbund_classification1
certbund_published1761818603 (10/30/2025)
certbund_titlebinutils: Schwachstelle ermöglicht Offenlegung von Informationen
certbund_productsUbuntu Linux Open Source binutils
certbund_basescore3.3
certbund_nopatch0

Do you need the next level of professionalism?

Upgrade your account now!