GNU Binutils facing Integer Overflow Vulnerability

Share on facebook
Share on google
Share on twitter
Share on linkedin

GNU Binutils ‘libiberty’  was found to be prone to an integer overflow vulnerability as it fails to properly bound check the user supplied data before it is copied to an insufficiently priced memory buffer. An attacker can take advantage of this vulnerability to execute arbitrary code within the context of the affected application. If they fail to exploit  then it would result in a denial of service issue.

CVE : CVE-2019-14250

Affected versions :-

GNU libiberty 9.1.0
GNU libiberty 0
GNU Binutils 2.32

Recent Posts

Follow Us

Web Application Firewall Solution

Sign up for our Newsletter

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit