GNU Binutils 2.43/2.44 objdump binutils/bucomm.c display_info Ukuphikwa Kwenkonzo

Kutholakale ubuthakathaka obubizwa ngokuthi kuyinkinga ku GNU Binutils 2.43/2.44. Kuthinteka umsebenzi ongaziwayo kufayela binutils/bucomm.c kwe-component objdump. Ukuguqulwa kubangela uhlobo lwe Ukuphikwa Kwenkonzo. Ukusebenzisa i-CWE ukumemezela inkinga kuholela ku-CWE-401. Lobu buthakathaka bakhishwa obala 2025-04-03 njenge 32716. Isaziso sitholakala ukuthi singalayishwa ku-sourceware.org. Le buthakathaka ibizwa ngokuthi CVE-2025-3198. Ukuhlasela kudinga ukuba kusondele endaweni. Imininingwane yezobuchwepheshe iyatholakala. Ngaphezu kwalokho, i-exploit iyatholakala. Ukuhlaselwa sekumenyezelwe emphakathini futhi kungenzeka kusetshenziswe. Njengamanje, intengo yamanje ye-exploit ingahle ibe cishe USD $0-$5k okwamanje. Kungenzeka ukuthi i-exploit ingalandwa ku-sourceware.org. Igama lepatchi ngu-ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. Isilungiso sesilungele ukulanda ku-sourceware.org. Kuhle ukufaka iphetshi ukuze kulungiswe loludaba. Ubuthakathaka lolu lukhona futhi kwamanye ama-database okubuthakathaka: Tenable (249290). Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

5 Ukulungiswa · 101 Amaphuzu wedatha

InsimuKudalwa
2025-04-03 13:19
Ukuvuselelwa 1/4
2025-04-04 12:11
Ukuvuselelwa 2/4
2025-04-04 14:13
Ukuvuselelwa 3/4
2025-08-15 15:17
Ukuvuselelwa 4/4
2025-10-30 12:16
software_vendorGNUGNUGNUGNUGNU
software_nameBinutilsBinutilsBinutilsBinutilsBinutils
software_version2.43/2.442.43/2.442.43/2.442.43/2.442.43/2.44
software_componentobjdumpobjdumpobjdumpobjdumpobjdump
software_filebinutils/bucomm.cbinutils/bucomm.cbinutils/bucomm.cbinutils/bucomm.cbinutils/bucomm.c
software_functiondisplay_infodisplay_infodisplay_infodisplay_infodisplay_info
vulnerability_cweCWE-401 (Ukuphikwa Kwenkonzo)CWE-401 (Ukuphikwa Kwenkonzo)CWE-401 (Ukuphikwa Kwenkonzo)CWE-401 (Ukuphikwa Kwenkonzo)CWE-401 (Ukuphikwa Kwenkonzo)
vulnerability_risk11111
cvss3_vuldb_avLLLLL
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iNNNNN
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rlOOOOO
cvss3_vuldb_rcCCCCC
advisory_identifier3271632716327163271632716
advisory_urlhttps://sourceware.org/bugzilla/show_bug.cgi?id=32716https://sourceware.org/bugzilla/show_bug.cgi?id=32716https://sourceware.org/bugzilla/show_bug.cgi?id=32716https://sourceware.org/bugzilla/show_bug.cgi?id=32716https://sourceware.org/bugzilla/show_bug.cgi?id=32716
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0
countermeasure_nameIphethshiIphethshiIphethshiIphethshiIphethshi
patch_nameba6ad3a18cb26b79e0e3b84c39f707535bbc344dba6ad3a18cb26b79e0e3b84c39f707535bbc344dba6ad3a18cb26b79e0e3b84c39f707535bbc344dba6ad3a18cb26b79e0e3b84c39f707535bbc344dba6ad3a18cb26b79e0e3b84c39f707535bbc344d
countermeasure_patch_urlhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344dhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344dhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344dhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344dhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d
source_cveCVE-2025-3198CVE-2025-3198CVE-2025-3198CVE-2025-3198CVE-2025-3198
cna_responsibleVulDBVulDBVulDBVulDBVulDB
software_typeProgramming Tool SoftwareProgramming Tool SoftwareProgramming Tool SoftwareProgramming Tool SoftwareProgramming Tool Software
cvss2_vuldb_avLLLLL
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiNNNNN
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcCCCCC
cvss2_vuldb_rlOFOFOFOFOF
cvss4_vuldb_avLLLLL
cvss4_vuldb_acLLLLL
cvss4_vuldb_prLLLLL
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viNNNNN
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore1.71.71.71.71.7
cvss2_vuldb_tempscore1.31.31.31.31.3
cvss3_vuldb_basescore3.33.33.33.33.3
cvss3_vuldb_tempscore3.03.03.03.03.0
cvss3_meta_basescore3.33.33.33.33.3
cvss3_meta_tempscore3.03.13.13.13.1
cvss4_vuldb_bscore4.84.84.84.84.8
cvss4_vuldb_btscore1.91.91.91.91.9
advisory_date1743631200 (2025-04-03)1743631200 (2025-04-03)1743631200 (2025-04-03)1743631200 (2025-04-03)1743631200 (2025-04-03)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.
cvss4_cna_avLLLL
cvss4_cna_acLLLL
cvss4_cna_atNNNN
cvss4_cna_prLLLL
cvss4_cna_uiNNNN
cvss4_cna_vcNNNN
cvss4_cna_viNNNN
cvss4_cna_vaLLLL
cvss4_cna_scNNNN
cvss4_cna_siNNNN
cvss4_cna_saNNNN
cvss4_cna_bscore4.84.84.84.8
cvss3_cna_avLLLL
cvss3_cna_acLLLL
cvss3_cna_prLLLL
cvss3_cna_uiNNNN
cvss3_cna_sUUUU
cvss3_cna_cNNNN
cvss3_cna_iNNNN
cvss3_cna_aLLLL
cvss3_cna_basescore3.33.33.33.3
cvss2_cna_avLLLL
cvss2_cna_acLLLL
cvss2_cna_auSSSS
cvss2_cna_ciNNNN
cvss2_cna_iiNNNN
cvss2_cna_aiPPPP
cvss2_cna_basescore1.71.71.71.7
cve_nvd_summaryesSe ha encontrado una vulnerabilidad en GNU Binutils 2.43/2.44, clasificada como problemática. Esta vulnerabilidad afecta a la función display_info del archivo binutils/bucomm.c del componente objdump. Esta manipulación provoca una fuga de memoria. Es necesario implementar un ataque localmente. Se ha hecho público el exploit y puede que sea utilizado. El parche se llama ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. Se recomienda aplicar un parche para solucionar este problema.Se ha encontrado una vulnerabilidad en GNU Binutils 2.43/2.44, clasificada como problemática. Esta vulnerabilidad afecta a la función display_info del archivo binutils/bucomm.c del componente objdump. Esta manipulación provoca una fuga de memoria. Es necesario implementar un ataque localmente. Se ha hecho público el exploit y puede que sea utilizado. El parche se llama ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. Se recomienda aplicar un parche para solucionar este problema.Se ha encontrado una vulnerabilidad en GNU Binutils 2.43/2.44, clasificada como problemática. Esta vulnerabilidad afecta a la función display_info del archivo binutils/bucomm.c del componente objdump. Esta manipulación provoca una fuga de memoria. Es necesario implementar un ataque localmente. Se ha hecho público el exploit y puede que sea utilizado. El parche se llama ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. Se recomienda aplicar un parche para solucionar este problema.
nessus_id249290249290
nessus_nameEulerOS 2.0 SP11 : binutils (EulerOS-SA-2025-1921)EulerOS 2.0 SP11 : binutils (EulerOS-SA-2025-1921)
certbund_widWID-SEC-2025-0709
certbund_classification1
certbund_published1761818603 (2025-10-30)
certbund_titlebinutils: Schwachstelle ermöglicht Offenlegung von Informationen
certbund_productsUbuntu Linux Open Source binutils
certbund_basescore3.3
certbund_nopatch0

Do you want to use VulDB in your project?

Use the official API to access entries easily!