GNU BinUtils 2.1x - Buffer Overflow

Author: Jesus Olmos Gonzalez
type: dos
platform: linux
port: 
date_added: 2006-05-11  
date_updated: 2013-08-25  
verified: 1  
codes: CVE-2006-2362;OSVDB-25711  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 27856.txt  
source: https://www.securityfocus.com/bid/17950/info

GNU 'binutils' is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

Remote attackers may crash the 'strings' utility, potentially making analysis of malicious binaries more difficult. Attackers may also execute arbitrary machine code in the context of applications that use the affected library.

%253Cc%253Cc%253Cc%253Cc%253Cc%253Cc%253Cc