Executive Summary
Summary | |
---|---|
Title | binutils-mingw-w64 security update |
Informations | |||
---|---|---|---|
Name | DSA-3123 | First vendor Publication | 2015-01-09 |
Vendor | Debian | Last vendor Modification | 2015-01-13 |
Severity (Vendor) | N/A | Revision | 2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
In DSA 3123 the binutils package was updated for several security issues. This update adds rebuilt packages for binutils-mingw-w64, so these will take advantage of the fixes. For reference the original advisory text follows. Multiple security issues have been found in binutils, a toolbox for binary file manipulation. These vulnerabilities include multiple memory safety errors, buffer overflows, use-after-frees and other implementation errors may lead to the execution of arbitrary code, the bypass of security restrictions, path traversal attack or denial of service. For the stable distribution (wheezy), these problems have been fixed in version 2+deb7u1. For the unstable distribution (sid), these problems will be fixed soon. We recommend that you upgrade your binutils-mingw-w64 packages. |
Original Source
Url : http://www.debian.org/security/2015/dsa-3123 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
75 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
12 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
12 % | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 | |
Os | 4 | |
Os | 1 | |
Os | 3 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-07-27 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-3367-1.nasl - Type : ACT_GATHER_INFO |
2016-12-08 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201612-24.nasl - Type : ACT_GATHER_INFO |
2015-12-22 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20151119_binutils_on_SL7_x.nasl - Type : ACT_GATHER_INFO |
2015-12-15 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2015-620.nasl - Type : ACT_GATHER_INFO |
2015-12-02 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2015-2079.nasl - Type : ACT_GATHER_INFO |
2015-11-24 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2015-2079.nasl - Type : ACT_GATHER_INFO |
2015-11-19 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-2079.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote Debian host is missing a security update. File : debian_DLA-184.nasl - Type : ACT_GATHER_INFO |
2015-03-25 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_f6a014cdd26811e48339001e679db764.nasl - Type : ACT_GATHER_INFO |
2015-02-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2496-1.nasl - Type : ACT_GATHER_INFO |
2015-02-06 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2015-029.nasl - Type : ACT_GATHER_INFO |
2015-01-29 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_binutils-201501-150122.nasl - Type : ACT_GATHER_INFO |
2015-01-22 | Name : The remote Fedora host is missing a security update. File : fedora_2015-0750.nasl - Type : ACT_GATHER_INFO |
2015-01-22 | Name : The remote Fedora host is missing a security update. File : fedora_2015-0471.nasl - Type : ACT_GATHER_INFO |
2015-01-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3123.nasl - Type : ACT_GATHER_INFO |
2015-01-02 | Name : The remote Fedora host is missing a security update. File : fedora_2014-17603.nasl - Type : ACT_GATHER_INFO |
2015-01-02 | Name : The remote Fedora host is missing a security update. File : fedora_2014-17586.nasl - Type : ACT_GATHER_INFO |
2014-12-07 | Name : The remote Fedora host is missing a security update. File : fedora_2014-14995.nasl - Type : ACT_GATHER_INFO |
2014-12-07 | Name : The remote Fedora host is missing a security update. File : fedora_2014-14888.nasl - Type : ACT_GATHER_INFO |
2014-12-07 | Name : The remote Fedora host is missing a security update. File : fedora_2014-14874.nasl - Type : ACT_GATHER_INFO |
2014-12-07 | Name : The remote Fedora host is missing a security update. File : fedora_2014-14838.nasl - Type : ACT_GATHER_INFO |
2014-12-06 | Name : The remote Fedora host is missing a security update. File : fedora_2014-14833.nasl - Type : ACT_GATHER_INFO |
2014-12-06 | Name : The remote Fedora host is missing a security update. File : fedora_2014-14963.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2015-01-15 21:27:53 |
|
2015-01-13 21:22:52 |
|
2015-01-13 13:23:45 |
|
2015-01-10 00:20:51 |
|