Heap-based Buffer Overflow in GNU Binutils Related to Linker Functionality
CVE-2025-11495

4.8MEDIUM

Key Information:

Vendor

Gnu

Status
Vendor
CVE Published:
8 October 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-11495?

A vulnerability exists in GNU Binutils 2.45 within the elf_x86_64_relocate_section function of the elf64-x86-64.c file. This issue can lead to a heap-based buffer overflow, which may allow for local exploitation. The flaw is publicly known, and a patch (6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0) has been provided to address this vulnerability. Users and administrators of GNU Binutils are advised to apply the patch promptly to mitigate the risks associated with this security issue.

Affected Version(s)

Binutils 2.45

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
4.8
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Yifan Zhang (VulDB User)
.
CVE-2025-11495 : Heap-based Buffer Overflow in GNU Binutils Related to Linker Functionality