GNU Binutils 2.43/2.44 objdump binutils/bucomm.c display_info Uskraćivanje usluge

Pronađena je ranjivost klasifikovana kao Problematiиno u GNU Binutils 2.43/2.44. Zahvaćeno je funkcija display_info u fajlu binutils/bucomm.c u komponenti objdump. Izmena rezultira Uskraćivanje usluge. Korišćenjem CWE za opis problema dolazi se do CWE-401. Ova slabost je objavljena 04/03/2025 kao 32716. Izveštaj je dostupan za preuzimanje na sourceware.org. Ova ranjivost je poznata pod oznakom CVE-2025-3198. Za sprovođenje napada neophodan je lokalni pristup. Tehnički podaci su dostupni. Поред тога, експлоит је доступан. Eksploatacija je javno objavljena i može biti iskorišćena. Trenutno je cena za eksploataciju približno USD $0-$5k u ovom momentu. Definisano je kao dokaz-of-koncept. Ekspoit je objavljen za preuzimanje na sourceware.org. Kao 0-day, očekivana cena na crnom tržištu bila je oko $0-$5k. Naziv zakrpe je ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. Zakrpa je dostupna za preuzimanje na sourceware.org. Preporučuje se instaliranje zakrpe za rešavanje ovog problema. Ova ranjivost je takođe evidentirana u drugim bazama podataka o ranjivostima: Tenable (249290). Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

5 Promene · 101 Tačke podataka

PoljeKreirali
04/03/2025 13:19
Ažurira 1/4
04/04/2025 12:11
Ažurira 2/4
04/04/2025 14:13
Ažurira 3/4
08/15/2025 15:17
Ažurira 4/4
10/30/2025 12:16
software_vendorGNUGNUGNUGNUGNU
software_nameBinutilsBinutilsBinutilsBinutilsBinutils
software_version2.43/2.442.43/2.442.43/2.442.43/2.442.43/2.44
software_componentobjdumpobjdumpobjdumpobjdumpobjdump
software_filebinutils/bucomm.cbinutils/bucomm.cbinutils/bucomm.cbinutils/bucomm.cbinutils/bucomm.c
software_functiondisplay_infodisplay_infodisplay_infodisplay_infodisplay_info
vulnerability_cweCWE-401 (Uskraćivanje usluge)CWE-401 (Uskraćivanje usluge)CWE-401 (Uskraćivanje usluge)CWE-401 (Uskraćivanje usluge)CWE-401 (Uskraćivanje usluge)
vulnerability_risk11111
cvss3_vuldb_avLLLLL
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iNNNNN
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rlOOOOO
cvss3_vuldb_rcCCCCC
advisory_identifier3271632716327163271632716
advisory_urlhttps://sourceware.org/bugzilla/show_bug.cgi?id=32716https://sourceware.org/bugzilla/show_bug.cgi?id=32716https://sourceware.org/bugzilla/show_bug.cgi?id=32716https://sourceware.org/bugzilla/show_bug.cgi?id=32716https://sourceware.org/bugzilla/show_bug.cgi?id=32716
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0
countermeasure_nameZakrpaZakrpaZakrpaZakrpaZakrpa
patch_nameba6ad3a18cb26b79e0e3b84c39f707535bbc344dba6ad3a18cb26b79e0e3b84c39f707535bbc344dba6ad3a18cb26b79e0e3b84c39f707535bbc344dba6ad3a18cb26b79e0e3b84c39f707535bbc344dba6ad3a18cb26b79e0e3b84c39f707535bbc344d
countermeasure_patch_urlhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344dhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344dhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344dhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344dhttps://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d
source_cveCVE-2025-3198CVE-2025-3198CVE-2025-3198CVE-2025-3198CVE-2025-3198
cna_responsibleVulDBVulDBVulDBVulDBVulDB
software_typeProgramming Tool SoftwareProgramming Tool SoftwareProgramming Tool SoftwareProgramming Tool SoftwareProgramming Tool Software
cvss2_vuldb_avLLLLL
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiNNNNN
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcCCCCC
cvss2_vuldb_rlOFOFOFOFOF
cvss4_vuldb_avLLLLL
cvss4_vuldb_acLLLLL
cvss4_vuldb_prLLLLL
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viNNNNN
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore1.71.71.71.71.7
cvss2_vuldb_tempscore1.31.31.31.31.3
cvss3_vuldb_basescore3.33.33.33.33.3
cvss3_vuldb_tempscore3.03.03.03.03.0
cvss3_meta_basescore3.33.33.33.33.3
cvss3_meta_tempscore3.03.13.13.13.1
cvss4_vuldb_bscore4.84.84.84.84.8
cvss4_vuldb_btscore1.91.91.91.91.9
advisory_date1743631200 (04/03/2025)1743631200 (04/03/2025)1743631200 (04/03/2025)1743631200 (04/03/2025)1743631200 (04/03/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.
cvss4_cna_avLLLL
cvss4_cna_acLLLL
cvss4_cna_atNNNN
cvss4_cna_prLLLL
cvss4_cna_uiNNNN
cvss4_cna_vcNNNN
cvss4_cna_viNNNN
cvss4_cna_vaLLLL
cvss4_cna_scNNNN
cvss4_cna_siNNNN
cvss4_cna_saNNNN
cvss4_cna_bscore4.84.84.84.8
cvss3_cna_avLLLL
cvss3_cna_acLLLL
cvss3_cna_prLLLL
cvss3_cna_uiNNNN
cvss3_cna_sUUUU
cvss3_cna_cNNNN
cvss3_cna_iNNNN
cvss3_cna_aLLLL
cvss3_cna_basescore3.33.33.33.3
cvss2_cna_avLLLL
cvss2_cna_acLLLL
cvss2_cna_auSSSS
cvss2_cna_ciNNNN
cvss2_cna_iiNNNN
cvss2_cna_aiPPPP
cvss2_cna_basescore1.71.71.71.7
cve_nvd_summaryesSe ha encontrado una vulnerabilidad en GNU Binutils 2.43/2.44, clasificada como problemática. Esta vulnerabilidad afecta a la función display_info del archivo binutils/bucomm.c del componente objdump. Esta manipulación provoca una fuga de memoria. Es necesario implementar un ataque localmente. Se ha hecho público el exploit y puede que sea utilizado. El parche se llama ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. Se recomienda aplicar un parche para solucionar este problema.Se ha encontrado una vulnerabilidad en GNU Binutils 2.43/2.44, clasificada como problemática. Esta vulnerabilidad afecta a la función display_info del archivo binutils/bucomm.c del componente objdump. Esta manipulación provoca una fuga de memoria. Es necesario implementar un ataque localmente. Se ha hecho público el exploit y puede que sea utilizado. El parche se llama ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. Se recomienda aplicar un parche para solucionar este problema.Se ha encontrado una vulnerabilidad en GNU Binutils 2.43/2.44, clasificada como problemática. Esta vulnerabilidad afecta a la función display_info del archivo binutils/bucomm.c del componente objdump. Esta manipulación provoca una fuga de memoria. Es necesario implementar un ataque localmente. Se ha hecho público el exploit y puede que sea utilizado. El parche se llama ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. Se recomienda aplicar un parche para solucionar este problema.
nessus_id249290249290
nessus_nameEulerOS 2.0 SP11 : binutils (EulerOS-SA-2025-1921)EulerOS 2.0 SP11 : binutils (EulerOS-SA-2025-1921)
certbund_widWID-SEC-2025-0709
certbund_classification1
certbund_published1761818603 (10/30/2025)
certbund_titlebinutils: Schwachstelle ermöglicht Offenlegung von Informationen
certbund_productsUbuntu Linux Open Source binutils
certbund_basescore3.3
certbund_nopatch0

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!