CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.
Analysis
A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.
Technical Context
A buffer overflow occurs when data written to a buffer exceeds its allocated size, potentially overwriting adjacent memory and corrupting program state.
Affected Products
Affected products: Gnu Binutils 2.45
Remediation
Use memory-safe languages or bounds-checked functions. Enable ASLR, DEP/NX, and stack canaries. Apply vendor patches promptly.
Priority Score
Vendor Status
Ubuntu
Priority: Medium| Release | Status | Version |
|---|---|---|
| xenial | released | 2.26.1-1ubuntu1~16.04.8+esm12 |
| upstream | released | 2.45-3 |
| bionic | released | 2.30-21ubuntu1~18.04.9+esm5 |
| jammy | released | 2.38-4ubuntu2.10 |
| noble | released | 2.42-4ubuntu2.6 |
| plucky | released | 2.44-3ubuntu1.1 |
| focal | released | 2.34-6ubuntu1.11+esm1 |
| trusty | released | 2.24-5ubuntu14.2+esm7 |
| questing | not-affected | 2.45-6ubuntu1 |
Debian
| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| bullseye | vulnerable | 2.35.2-2 | - |
| bookworm | vulnerable | 2.40-2 | - |
| trixie | vulnerable | 2.44-3 | - |
| forky, sid | fixed | 2.46-3 | - |
| (unstable) | fixed | 2.45-3 | unimportant |
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21278