CVE-2020-35496

There's a flaw in bfd_pef_scan_start_address() of bfd/pef.c in binutils which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability. This flaw affects binutils versions prior to 2.34.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 54%
VendorProductVersion
gnubinutils
𝑥
< 2.34
netappcloud_backup
-
netappontap_select_deploy_administration_utility
-
netappsolidfire\,_enterprise_sds_\&_hci_storage_node
-
netappsolidfire_\&_hci_management_node
-
broadcombrocade_fabric_operating_system_firmware
-
netapphci_compute_node_firmware
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
binutils
bullseye
2.35.2-2
fixed
bookworm
2.40-2
fixed
sid
2.43.1-5
fixed
trixie
2.43.1-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
binutils
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected