Metrics
Affected Vendors & Products
Tue, 11 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Mon, 10 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 10 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been found in GNU Binutils 2.43 and classified as problematic. Affected by this vulnerability is the function __sanitizer::internal_strlen of the file binutils/nm.c of the component nm. The manipulation of the argument const leads to buffer overflow. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. | |
Title | GNU Binutils nm nm.c internal_strlen buffer overflow | |
Weaknesses | CWE-119 CWE-120 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-02-10T15:15:26.835Z
Reserved: 2025-02-10T07:31:34.495Z
Link: CVE-2025-1147

Updated: 2025-02-10T15:15:04.271Z

Status : Received
Published: 2025-02-10T14:15:29.643
Modified: 2025-02-10T14:15:29.643
Link: CVE-2025-1147
