CVE-2006-2362

Buffer overflow in getsym in tekhex.c in libbfd in Free Software Foundation GNU Binutils before 20060423, as used by GNU strings, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a file with a crafted Tektronix Hex Format (TekHex) record in which the length character is not a valid hexadecimal character.
References
Link Resource
http://lists.apple.com/archives/security-announce/2007/Oct/msg00001.html Mailing List Third Party Advisory
http://secunia.com/advisories/20188 Third Party Advisory
http://secunia.com/advisories/20531 Third Party Advisory
http://secunia.com/advisories/20550 Third Party Advisory
http://secunia.com/advisories/22932 Third Party Advisory
http://secunia.com/advisories/27441 Third Party Advisory
http://sourceware.org/bugzilla/show_bug.cgi?id=2584 Exploit Issue Tracking Third Party Advisory
http://www.mail-archive.com/bug-binutils%40gnu.org/msg01516.html Issue Tracking Mailing List
http://www.novell.com/linux/security/advisories/2006_26_sr.html Third Party Advisory
http://www.securityfocus.com/bid/17950 Exploit Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018872 Third Party Advisory VDB Entry
http://www.trustix.org/errata/2006/0034/ Broken Link
http://www.ubuntu.com/usn/usn-292-1 Broken Link
http://www.vupen.com/english/advisories/2006/1924 Permissions Required
http://www.vupen.com/english/advisories/2007/3665 Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/26644 Third Party Advisory VDB Entry
http://lists.apple.com/archives/security-announce/2007/Oct/msg00001.html Mailing List Third Party Advisory
http://secunia.com/advisories/20188 Third Party Advisory
http://secunia.com/advisories/20531 Third Party Advisory
http://secunia.com/advisories/20550 Third Party Advisory
http://secunia.com/advisories/22932 Third Party Advisory
http://secunia.com/advisories/27441 Third Party Advisory
http://sourceware.org/bugzilla/show_bug.cgi?id=2584 Exploit Issue Tracking Third Party Advisory
http://www.mail-archive.com/bug-binutils%40gnu.org/msg01516.html Issue Tracking Mailing List
http://www.novell.com/linux/security/advisories/2006_26_sr.html Third Party Advisory
http://www.securityfocus.com/bid/17950 Exploit Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018872 Third Party Advisory VDB Entry
http://www.trustix.org/errata/2006/0034/ Broken Link
http://www.ubuntu.com/usn/usn-292-1 Broken Link
http://www.vupen.com/english/advisories/2006/1924 Permissions Required
http://www.vupen.com/english/advisories/2007/3665 Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/26644 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*

History

16 Jan 2025, 20:15

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : unknown
v2 : 7.5
v3 : 7.3

Information

Published : 2006-05-15 16:06

Updated : 2025-04-03 01:03


NVD link : CVE-2006-2362

Mitre link : CVE-2006-2362

CVE.ORG link : CVE-2006-2362


JSON object : View

Products Affected

gnu

  • binutils
CWE
CWE-787

Out-of-bounds Write