7.5

CVE-2014-8504

Exploit

Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted file.

Data is provided by the National Vulnerability Database (NVD)
CanonicalUbuntu Linux Version10.04 SwEditionlts
CanonicalUbuntu Linux Version12.04 SwEditionlts
CanonicalUbuntu Linux Version14.04 SwEditionlts
CanonicalUbuntu Linux Version14.10
GnuBinutils Version <= 2.24
FedoraprojectFedora Version19
FedoraprojectFedora Version20
FedoraprojectFedora Version21
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 4.45% 0.886
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

http://secunia.com/advisories/62241
Third Party Advisory
Permissions Required
http://secunia.com/advisories/62746
Third Party Advisory
Permissions Required
http://www.openwall.com/lists/oss-security/2014/10/27/4
Third Party Advisory
Exploit
Mailing List
http://www.openwall.com/lists/oss-security/2014/10/27/5
Third Party Advisory
Exploit
Mailing List
http://www.securityfocus.com/bid/70761
Third Party Advisory
VDB Entry