CVE-2014-0172

Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 82%
VendorProductVersion
elfutils_projectelfutils
0.153
elfutils_projectelfutils
0.154
elfutils_projectelfutils
0.155
elfutils_projectelfutils
0.156
elfutils_projectelfutils
0.157
elfutils_projectelfutils
0.158
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
elfutils
bullseye
0.183-1
fixed
squeeze
not-affected
wheezy
not-affected
bookworm
0.188-2.1
fixed
sid
0.192-4
fixed
trixie
0.192-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
elfutils
trusty
Fixed 0.158-0ubuntu5.1
released
saucy
Fixed 0.157-1ubuntu1.1
released
quantal
Fixed 0.153-1ubuntu1.1
released
precise
not-affected
lucid
not-affected
Common Weakness Enumeration