ID

VAR-201902-0881


CVE

CVE-2019-9070


TITLE

GNU Binutils Vulnerable to out-of-bounds reading

Trust: 0.8

sources: JVNDB: JVNDB-2019-001993

DESCRIPTION

An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. It is a heap-based buffer over-read in d_expression_1 in cp-demangle.c after many recursive calls. GNU Binutils Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Attackers can exploit these issues to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in denial-of-service conditions. The program is primarily designed to handle object files in various formats and provides linkers, assemblers, and other tools for object files and archives. libiberty is a collection of subroutines used by one of the GNU programs. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202107-24 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Binutils: Multiple vulnerabilities Date: July 10, 2021 Bugs: #678806, #761957, #764170 ID: 202107-24 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Binutils, the worst of which could result in a Denial of Service condition. Background ========== The GNU Binutils are a collection of tools to create, modify and analyse binary files. Many of the files use BFD, the Binary File Descriptor library, to do low-level manipulation. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 sys-devel/binutils < 2.35.2 >= 2.35.2 Description =========== Multiple vulnerabilities have been discovered in Binutils. Please review the CVE identifiers referenced below for details. Impact ====== Please review the referenced CVE identifiers for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Binutils users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=sys-devel/binutils-2.35.2" References ========== [ 1 ] CVE-2019-9070 https://nvd.nist.gov/vuln/detail/CVE-2019-9070 [ 2 ] CVE-2019-9071 https://nvd.nist.gov/vuln/detail/CVE-2019-9071 [ 3 ] CVE-2019-9072 https://nvd.nist.gov/vuln/detail/CVE-2019-9072 [ 4 ] CVE-2019-9073 https://nvd.nist.gov/vuln/detail/CVE-2019-9073 [ 5 ] CVE-2019-9074 https://nvd.nist.gov/vuln/detail/CVE-2019-9074 [ 6 ] CVE-2019-9075 https://nvd.nist.gov/vuln/detail/CVE-2019-9075 [ 7 ] CVE-2019-9076 https://nvd.nist.gov/vuln/detail/CVE-2019-9076 [ 8 ] CVE-2019-9077 https://nvd.nist.gov/vuln/detail/CVE-2019-9077 [ 9 ] CVE-2020-19599 https://nvd.nist.gov/vuln/detail/CVE-2020-19599 [ 10 ] CVE-2020-35448 https://nvd.nist.gov/vuln/detail/CVE-2020-35448 [ 11 ] CVE-2020-35493 https://nvd.nist.gov/vuln/detail/CVE-2020-35493 [ 12 ] CVE-2020-35494 https://nvd.nist.gov/vuln/detail/CVE-2020-35494 [ 13 ] CVE-2020-35495 https://nvd.nist.gov/vuln/detail/CVE-2020-35495 [ 14 ] CVE-2020-35496 https://nvd.nist.gov/vuln/detail/CVE-2020-35496 [ 15 ] CVE-2020-35507 https://nvd.nist.gov/vuln/detail/CVE-2020-35507 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202107-24 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2021 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . ========================================================================== Ubuntu Security Notice USN-4326-1 April 08, 2020 libiberty vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in libiberty. Software Description: - libiberty: library of utility functions used by GNU programs Details: It was discovered that libiberty incorrectly handled parsing certain binaries. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could use this issue to cause libiberty to crash, resulting in a denial of service, or possibly execute arbitrary code Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: libiberty-dev 20170913-1ubuntu0.1 Ubuntu 16.04 LTS: libiberty-dev 20160215-1ubuntu0.3 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/4326-1 CVE-2018-12641, CVE-2018-12697, CVE-2018-12698, CVE-2018-12934, CVE-2018-17794, CVE-2018-17985, CVE-2018-18483, CVE-2018-18484, CVE-2018-18700, CVE-2018-18701, CVE-2018-9138, CVE-2019-14250, CVE-2019-9070, CVE-2019-9071 Package Information: https://launchpad.net/ubuntu/+source/libiberty/20170913-1ubuntu0.1 https://launchpad.net/ubuntu/+source/libiberty/20160215-1ubuntu0.3

Trust: 2.16

sources: NVD: CVE-2019-9070 // JVNDB: JVNDB-2019-001993 // BID: 107147 // VULHUB: VHN-160505 // PACKETSTORM: 163455 // PACKETSTORM: 157172

AFFECTED PRODUCTS

vendor:gnumodel:binutilsscope:eqversion:2.32

Trust: 1.3

vendor:netappmodel:element software managementscope:eqversion:*

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:lteversion:5.1.0

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:gteversion:5.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:gnumodel:binutilsscope: - version: -

Trust: 0.8

vendor:netappmodel:element softwarescope: - version: -

Trust: 0.8

vendor:gnumodel:libibertyscope:eqversion:0

Trust: 0.3

sources: BID: 107147 // JVNDB: JVNDB-2019-001993 // NVD: CVE-2019-9070

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-9070
value: HIGH

Trust: 1.0

NVD: CVE-2019-9070
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201902-844
value: HIGH

Trust: 0.6

VULHUB: VHN-160505
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-9070
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-160505
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-9070
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2019-9070
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-160505 // JVNDB: JVNDB-2019-001993 // CNNVD: CNNVD-201902-844 // NVD: CVE-2019-9070

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.9

sources: VULHUB: VHN-160505 // JVNDB: JVNDB-2019-001993 // NVD: CVE-2019-9070

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201902-844

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201902-844

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-001993

PATCH

title:NTAP-20190314-0003url:https://security.netapp.com/advisory/ntap-20190314-0003/

Trust: 0.8

title:Bug 24229url:https://sourceware.org/bugzilla/show_bug.cgi?id=24229

Trust: 0.8

sources: JVNDB: JVNDB-2019-001993

EXTERNAL IDS

db:NVDid:CVE-2019-9070

Trust: 3.0

db:BIDid:107147

Trust: 2.0

db:PACKETSTORMid:163455

Trust: 0.8

db:JVNDBid:JVNDB-2019-001993

Trust: 0.8

db:CNNVDid:CNNVD-201902-844

Trust: 0.7

db:PACKETSTORMid:157172

Trust: 0.7

db:AUSCERTid:ESB-2020.1400

Trust: 0.6

db:AUSCERTid:ESB-2020.1258

Trust: 0.6

db:AUSCERTid:ESB-2021.2483

Trust: 0.6

db:AUSCERTid:ESB-2019.1897

Trust: 0.6

db:VULHUBid:VHN-160505

Trust: 0.1

sources: VULHUB: VHN-160505 // BID: 107147 // JVNDB: JVNDB-2019-001993 // PACKETSTORM: 163455 // PACKETSTORM: 157172 // CNNVD: CNNVD-201902-844 // NVD: CVE-2019-9070

REFERENCES

url:http://www.securityfocus.com/bid/107147

Trust: 2.3

url:https://support.f5.com/csp/article/k13534168

Trust: 2.3

url:https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395

Trust: 2.0

url:https://sourceware.org/bugzilla/show_bug.cgi?id=24229

Trust: 2.0

url:https://security.gentoo.org/glsa/202107-24

Trust: 1.8

url:https://security.netapp.com/advisory/ntap-20190314-0003/

Trust: 1.7

url:https://usn.ubuntu.com/4326-1/

Trust: 1.7

url:https://usn.ubuntu.com/4336-1/

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-9070

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9070

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.1258/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1400/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2483

Trust: 0.6

url:https://packetstormsecurity.com/files/157172/ubuntu-security-notice-usn-4326-1.html

Trust: 0.6

url:https://vigilance.fr/vulnerability/binutils-information-disclosure-via-d-expression-1-29416

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1143448

Trust: 0.6

url:https://packetstormsecurity.com/files/163455/gentoo-linux-security-advisory-202107-24.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.1897/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-gnu-binutils-affect-ibm-netezza-performance-server/

Trust: 0.6

url:https://www.gnu.org/software/binutils/

Trust: 0.3

url:https://sourceware.org/bugzilla/show_bug.cgi?id=24227

Trust: 0.3

url:https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-35495

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-19599

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9071

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9077

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-35493

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9073

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9072

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-35448

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9074

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-35507

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-35496

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9076

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9075

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-35494

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-12641

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libiberty/20170913-1ubuntu0.1

Trust: 0.1

url:https://usn.ubuntu.com/4326-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-17794

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libiberty/20160215-1ubuntu0.3

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-18700

Trust: 0.1

sources: VULHUB: VHN-160505 // BID: 107147 // JVNDB: JVNDB-2019-001993 // PACKETSTORM: 163455 // PACKETSTORM: 157172 // CNNVD: CNNVD-201902-844 // NVD: CVE-2019-9070

CREDITS

Ubuntu,spinpx

Trust: 0.6

sources: CNNVD: CNNVD-201902-844

SOURCES

db:VULHUBid:VHN-160505
db:BIDid:107147
db:JVNDBid:JVNDB-2019-001993
db:PACKETSTORMid:163455
db:PACKETSTORMid:157172
db:CNNVDid:CNNVD-201902-844
db:NVDid:CVE-2019-9070

LAST UPDATE DATE

2024-11-23T19:54:29.333000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-160505date:2021-12-10T00:00:00
db:BIDid:107147date:2019-02-23T00:00:00
db:JVNDBid:JVNDB-2019-001993date:2019-04-01T00:00:00
db:CNNVDid:CNNVD-201902-844date:2021-12-13T00:00:00
db:NVDid:CVE-2019-9070date:2024-11-21T04:50:55.423

SOURCES RELEASE DATE

db:VULHUBid:VHN-160505date:2019-02-24T00:00:00
db:BIDid:107147date:2019-02-23T00:00:00
db:JVNDBid:JVNDB-2019-001993date:2019-04-01T00:00:00
db:PACKETSTORMid:163455date:2021-07-11T12:01:11
db:PACKETSTORMid:157172date:2020-04-08T16:55:30
db:CNNVDid:CNNVD-201902-844date:2019-02-23T00:00:00
db:NVDid:CVE-2019-9070date:2019-02-24T00:29:00.237