Buffer Overflow Vulnerability in Libiberty Affecting GCC
CVE-2016-4491

5.5MEDIUM

Key Information:

Vendor
Gnu
Status
Vendor
CVE Published:
24 February 2017

Summary

The d_print_comp function in cp-demangle.c from the Libiberty library within the GNU Compiler Collection is susceptible to a denial of service attack due to a critical flaw. Attackers can exploit this vulnerability by supplying a specially crafted binary, which may lead to infinite recursion and a buffer overflow. This can force the application to crash, resulting in a segmentation fault. The issue arises when a node incorrectly references itself as an ancestor multiple times, causing an unfavorable condition during the demangling process.

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.