2024-12-08 03:06:42 +00:00

124 lines
3.8 KiB
JSON

{
"id": "CVE-2017-8397",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-05-01T18:59:00.340",
"lastModified": "2024-11-21T03:33:57.020",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 and an invalid write of size 1 during processing of a corrupt binary containing reloc(s) with negative addresses. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash."
},
{
"lang": "es",
"value": "La librer\u00eda Binary File Descriptor (BFD) (tambi\u00e9n conocida como libbfd), tal como se distribuye en GNU Binutils 2.28, es vulnerable a una lectura o escritura no v\u00e1lida de tama\u00f1o 1 provocada durante el procesamiento de un binario corrupto que contenga reloc(s) con direcciones negativas. Esta vulnerabilidad provoca la ca\u00edda del servicio en programas que analizan binarios utilizando la librer\u00eda libbfd, como objcopy."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "0EC528B1-A659-4246-BE7F-02681D22CCF5"
}
]
}
]
}
],
"references": [
{
"url": "https://security.gentoo.org/glsa/201709-02",
"source": "cve@mitre.org"
},
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=21434",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/201709-02",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=21434",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}