CVE-2017-7608
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
09/04/2017
Last modified:
20/04/2025
Description
The ebl_object_note_type_name function in eblobjnotetypename.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:elfutils_project:elfutils:0.168:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- http://www.securityfocus.com/bid/98609
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- https://security.gentoo.org/glsa/201710-10
- https://usn.ubuntu.com/3670-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- http://www.securityfocus.com/bid/98609
- https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- https://security.gentoo.org/glsa/201710-10
- https://usn.ubuntu.com/3670-1/



