Theres a flaw in bfd_pef_scan_start_address() of bfd/pef.c in binutils which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability. This flaw affects binutils versions prior to 2.34.
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Binutils | Gnu | * | 2.34 (excluding) |
Binutils | Ubuntu | precise/esm | * |
Binutils | Ubuntu | trusty | * |
Binutils | Ubuntu | upstream | * |
Binutils | Ubuntu | xenial | * |