Metrics
Affected Vendors & Products
Thu, 20 Feb 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gnu
Gnu binutils |
|
CPEs | cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:* | |
Vendors & Products |
Gnu
Gnu binutils |
Tue, 11 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 11 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 11 Feb 2025 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in GNU Binutils 2.43 and classified as critical. This issue affects the function _bfd_elf_gc_mark_rsec of the file elflink.c of the component ld. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The patch is named f9978defb6fab0bd8583942d97c112b0932ac814. It is recommended to apply a patch to fix this issue. | |
Title | GNU Binutils ld elflink.c _bfd_elf_gc_mark_rsec heap-based overflow | |
Weaknesses | CWE-119 CWE-122 |
|
References |
|
|
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-02-11T15:17:27.922Z
Reserved: 2025-02-10T10:18:49.164Z
Link: CVE-2025-1176

Updated: 2025-02-11T15:16:56.260Z

Status : Analyzed
Published: 2025-02-11T06:15:22.433
Modified: 2025-02-20T16:40:56.790
Link: CVE-2025-1176
