Vulnerability Details : CVE-2014-0172
Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2014-0172
Probability of exploitation activity in the next 30 days: 4.43%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 91 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-0172
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2014-0172
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-0172
-
https://lists.fedorahosted.org/pipermail/elfutils-devel/2014-April/003921.html
[PATCH] CVE-2014-0172 Check for overflow before calling malloc to uncompress data.Patch
-
http://seclists.org/oss-sec/2014/q2/54
oss-sec: Heap-based buffer overflow in libdw/elfutils (CVE-2014-0172)
-
https://bugzilla.redhat.com/show_bug.cgi?id=1085663
1085663 – (CVE-2014-0172) CVE-2014-0172 elfutils: integer overflow, leading to a heap-based buffer overflow in libdw
-
https://security.gentoo.org/glsa/201612-32
elfutils: Heap-based buffer overflow (GLSA 201612-32) — Gentoo security
-
http://www.securityfocus.com/bid/66714
Elfutils libdw 'check_section()' Function Remote Heap Based Buffer Overflow Vulnerability
-
http://www.ubuntu.com/usn/USN-2188-1
USN-2188-1: elfutils vulnerability | Ubuntu security notices
Products affected by CVE-2014-0172
- cpe:2.3:a:elfutils_project:elfutils:0.155:*:*:*:*:*:*:*
- cpe:2.3:a:elfutils_project:elfutils:0.156:*:*:*:*:*:*:*
- cpe:2.3:a:elfutils_project:elfutils:0.153:*:*:*:*:*:*:*
- cpe:2.3:a:elfutils_project:elfutils:0.154:*:*:*:*:*:*:*
- cpe:2.3:a:elfutils_project:elfutils:0.157:*:*:*:*:*:*:*
- cpe:2.3:a:elfutils_project:elfutils:0.158:*:*:*:*:*:*:*