{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2014-8501", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) and possibly have other unspecified impact via a crafted NumberOfRvaAndSizes field in the AOUT header in a PE executable." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "[oss-security] 20141026 Re: Re: strings / libbfd crasher", "refsource" : "MLIST", "url" : "http://www.openwall.com/lists/oss-security/2014/10/26/3" }, { "name" : "[oss-security] 20141031 Re: strings / libbfd crasher", "refsource" : "MLIST", "url" : "http://www.openwall.com/lists/oss-security/2014/10/31/1" }, { "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1162570", "refsource" : "CONFIRM", "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1162570" }, { "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=17512", "refsource" : "CONFIRM", "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=17512" }, { "name" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e1e19887abd24aeb15066b141cdff5541e0ec8e", "refsource" : "CONFIRM", "url" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e1e19887abd24aeb15066b141cdff5541e0ec8e" }, { "name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource" : "CONFIRM", "url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name" : "FEDORA-2014-14838", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145742.html" }, { "name" : "FEDORA-2014-14963", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145262.html" }, { "name" : "FEDORA-2014-14995", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145328.html" }, { "name" : "FEDORA-2014-17586", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147354.html" }, { "name" : "FEDORA-2014-17603", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147346.html" }, { "name" : "FEDORA-2015-0471", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148427.html" }, { "name" : "GLSA-201612-24", "refsource" : "GENTOO", "url" : "https://security.gentoo.org/glsa/201612-24" }, { "name" : "MDVSA-2015:029", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:029" }, { "name" : "USN-2496-1", "refsource" : "UBUNTU", "url" : "http://www.ubuntu.com/usn/USN-2496-1" }, { "name" : "70866", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/70866" }, { "name" : "62241", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/62241" }, { "name" : "62746", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/62746" } ] } }