USN-292-1: binutils vulnerability

Publication date

9 June 2006

Overview

binutils vulnerability


Details

CVE-2006-2362

Jesus Olmos Gonzalez discovered a buffer overflow in the Tektronix Hex
Format (TekHex) backend of the BFD library, such as used by the
‘strings’ utility. By tricking an user or automated system into
processing a specially crafted file with ‘strings’ or a vulnerable
third-party application using the BFD library, this could be exploited
to crash the application, or possibly even execute arbitrary code with
the privileges of the user.

CVE-2006-2362

Jesus Olmos Gonzalez discovered a buffer overflow in the Tektronix Hex
Format (TekHex) backend of the BFD library, such as used by the
‘strings’ utility. By tricking an user or automated system into
processing a specially crafted file with ‘strings’ or a vulnerable
third-party application using the BFD library, this could be exploited
to crash the application, or possibly even execute arbitrary code with
the privileges of the user.

Update instructions

In general, a standard system upgrade is sufficient to effect the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
6.06 dapper binutils-dev –  2.16.1cvs20060117-1ubuntu2.1
binutils –  2.16.1cvs20060117-1ubuntu2.1
5.10 breezy binutils-dev –  2.16.1-2ubuntu6.1
binutils –  2.16.1-2ubuntu6.1
5.04 hoary binutils-dev –  2.15-5ubuntu2.3
binutils –  2.15-5ubuntu2.3

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›