[arch-security] [Arch Linux Security Advisory ASA-201411-17] binutils: multiple issues
Levente Polyak
anthraxx at archlinux.org
Wed Nov 19 01:56:59 UTC 2014
Arch Linux Security Advisory ASA-201411-17
==========================================
Severity: Medium
Date : 2014-11-19
CVE-ID : CVE-2014-8484 CVE-2014-8485 CVE-2014-8501 CVE-2014-8502
CVE-2014-8503 CVE-2014-8504 CVE-2014-8737 CVE-2014-8738
Package : binutils
Type : multiple issues
Remote : No
Link : https://wiki.archlinux.org/index.php/CVE-2014
Summary
=======
The package binutils before version 2.24-8 is vulnerable to multiple
issues including but not limited to denial of service, directory
traversal, heap and stack overflow leading to possible code execution.
Resolution
==========
Upgrade to 2.24-8.
# pacman -Syu "binutils>=2.24-8"
The problems have been fixed upstream but no release is available yet.
Workaround
==========
None.
Description
===========
- CVE-2014-8484 (invalid read)
Invalid read flaw leads to denial of service while parsing specially
crafted files in programs using libbfd.
- CVE-2014-8485 (out-of-bounds write)
Lack of range checking leading to controlled write in
_bfd_elf_setup_sections() which results in denial of service or possible
code execution in programs using libbfd.
- CVE-2014-8501 (out-of-bounds write)
Out-of-bounds write when parsing specially crafted PE executable leads
to denial of service in "strings", "nm" and "objdump".
- CVE-2014-8502 (heap overflow)
Heap buffer overflow when parsing specially crafted PE executable leads
to denial of service in "objdump".
- CVE-2014-8503 (stack overflow)
Stack overflow in "objdump" when parsing specially crafted ihex files
leads to denial of service or code execution.
- CVE-2014-8504 (stack overflow)
Stack overflow in the SREC parser leads to denial of service or code
execution when parsing specially crafted files.
- CVE-2014-8737 (directory traversal)
Directory traversal vulnerability allowing arbitrary file deletion and
creation.
- CVE-2014-8738 (out-of-bounds write)
Out-of-bounds memory write while processing a crafted "ar" archive leads
to denial of service in "objdump".
Impact
======
An attacker with specially crafted files can perform denial of service,
directory traversal, heap and stack overflow leading to possible code
execution. Programs using libbfd may also be remotely exploitable.
References
==========
https://access.redhat.com/security/cve/CVE-2014-8484
https://access.redhat.com/security/cve/CVE-2014-8485
https://access.redhat.com/security/cve/CVE-2014-8501
https://access.redhat.com/security/cve/CVE-2014-8502
https://access.redhat.com/security/cve/CVE-2014-8503
https://access.redhat.com/security/cve/CVE-2014-8504
https://access.redhat.com/security/cve/CVE-2014-8737
https://access.redhat.com/security/cve/CVE-2014-8738
http://seclists.org/oss-sec/2014/q4/424
http://seclists.org/oss-sec/2014/q4/599
https://bugs.archlinux.org/task/42773
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20141119/72bd707c/attachment.bin>
More information about the arch-security
mailing list