CVE-2025-1147

A vulnerability has been found in GNU Binutils 2.43 and classified as problematic. Affected by this vulnerability is the function __sanitizer::internal_strlen of the file binutils/nm.c of the component nm. The manipulation of the argument const leads to buffer overflow. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*

History

04 Apr 2025, 23:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20250404-0003/ -
References () https://vuldb.com/?submit.485254 - Third Party Advisory, VDB Entry, Exploit () https://vuldb.com/?submit.485254 - Exploit, Third Party Advisory, VDB Entry
CWE CWE-120
CWE-119

04 Mar 2025, 14:53

Type Values Removed Values Added
First Time Gnu binutils
Gnu
CVSS v2 : unknown
v3 : 3.1
v2 : unknown
v3 : 5.3
References () https://sourceware.org/bugzilla/attachment.cgi?id=15881 - () https://sourceware.org/bugzilla/attachment.cgi?id=15881 - Broken Link
References () https://sourceware.org/bugzilla/show_bug.cgi?id=32556 - () https://sourceware.org/bugzilla/show_bug.cgi?id=32556 - Exploit, Issue Tracking
References () https://www.gnu.org/ - () https://www.gnu.org/ - Product
References () https://vuldb.com/?id.295051 - () https://vuldb.com/?id.295051 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?ctiid.295051 - () https://vuldb.com/?ctiid.295051 - Permissions Required, VDB Entry
References () https://vuldb.com/?submit.485254 - () https://vuldb.com/?submit.485254 - Third Party Advisory, VDB Entry, Exploit
CPE cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*

10 Feb 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-10 14:15

Updated : 2025-04-04 23:15


NVD link : CVE-2025-1147

Mitre link : CVE-2025-1147


JSON object : View

Products Affected

gnu

  • binutils
CWE

No CWE.