Metrics
Affected Vendors & Products
Sat, 05 Apr 2025 00:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 04 Apr 2025 23:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gnu
Gnu binutils |
|
CPEs | cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:* | |
Vendors & Products |
Gnu
Gnu binutils |
Tue, 11 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Mon, 10 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 10 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been found in GNU Binutils 2.43 and classified as problematic. Affected by this vulnerability is the function __sanitizer::internal_strlen of the file binutils/nm.c of the component nm. The manipulation of the argument const leads to buffer overflow. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. | |
Title | GNU Binutils nm nm.c internal_strlen buffer overflow | |
Weaknesses | CWE-119 CWE-120 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-02-10T13:31:07.649Z
Updated: 2025-04-04T23:03:08.236Z
Reserved: 2025-02-10T07:31:34.495Z
Link: CVE-2025-1147

Updated: 2025-04-04T23:03:08.236Z

Status : Modified
Published: 2025-02-10T14:15:29.643
Modified: 2025-04-04T23:15:41.910
Link: CVE-2025-1147
