Buffer Overflow Vulnerability in libiberty Affects GCC Compiler
CVE-2016-4492

4.4MEDIUM

Key Information:

Vendor
Gnu
Status
Vendor
CVE Published:
24 February 2017

Summary

The vulnerability in the do_type function located in cplus-dem.c within libiberty allows remote attackers to exploit the buffer overflow flaw. By sending a specially crafted binary to the affected system, attackers can trigger a denial of service condition, causing a segmentation fault and subsequent application crash. This issue emphasizes the need for robust input validation and safe handling of binary formats to mitigate potential exploitation.

References

CVSS V3.1

Score:
4.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.