Buffer Overflow Vulnerability in libiberty Affects GCC Compiler
CVE-2016-4492
4.4MEDIUM
Summary
The vulnerability in the do_type function located in cplus-dem.c within libiberty allows remote attackers to exploit the buffer overflow flaw. By sending a specially crafted binary to the affected system, attackers can trigger a denial of service condition, causing a segmentation fault and subsequent application crash. This issue emphasizes the need for robust input validation and safe handling of binary formats to mitigate potential exploitation.
References
CVSS V3.1
Score:
4.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved