ID CVE-2005-4808
Summary Buffer overflow in reset_vars in config/tc-crx.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050714 allows user-assisted attackers to have an unknown impact via a crafted .s file. This vulnerability is addressed in the following patch: GNU, Binutils, patch 20050714
References
Vulnerable Configurations
  • cpe:2.3:a:gnu:binutils:-:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:-:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.7:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.8:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.9:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.10:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.10.1a:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.10.1a:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.11:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.11.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.11.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.11.2a:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.11.2a:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.12:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.12.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.12.1a:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.12.1a:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.13:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.13:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.13.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.13.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.13.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.13.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.13.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.13.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.13.2.1a:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.13.2.1a:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.14:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.14:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.14a:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.14a:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.15:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.15:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.15a:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.15a:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.16.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.16.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:binutils:2.16.1a:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:binutils:2.16.1a:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
CVSS
Base: 7.6 (as of 01-04-2020 - 12:53)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:H/Au:N/C:C/I:C/A:C
refmap via4
confirm http://sources.redhat.com/bugzilla/show_bug.cgi?id=1069
ubuntu USN-366-1
xf binutils-resetvars-bo(44661)
statements via4
contributor Mark J Cox
lastmodified 2006-08-24
organization Red Hat
statement gas (and gcc) make no promise that they are fault tolerant to bad input. We do not plan on producing security updates for Red Hat Enterprise Linux to correct these bugs.
Last major update 01-04-2020 - 12:53
Published 31-12-2005 - 05:00
Last modified 01-04-2020 - 12:53
Back to Top