CVE-2014-0172
11.04.2014, 15:55
Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.Enginsight
| Vendor | Product | Version |
|---|---|---|
| elfutils_project | elfutils | 0.153 |
| elfutils_project | elfutils | 0.154 |
| elfutils_project | elfutils | 0.155 |
| elfutils_project | elfutils | 0.156 |
| elfutils_project | elfutils | 0.157 |
| elfutils_project | elfutils | 0.158 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References