CVE-2025-7545

A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:binutils:2.45:*:*:*:*:*:*:*

History

30 Jul 2025, 15:59

Type Values Removed Values Added
References () https://sourceware.org/bugzilla/attachment.cgi?id=16117 - () https://sourceware.org/bugzilla/attachment.cgi?id=16117 - Broken Link
References () https://sourceware.org/bugzilla/show_bug.cgi?id=33049 - () https://sourceware.org/bugzilla/show_bug.cgi?id=33049 - Issue Tracking
References () https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1 - () https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1 - Issue Tracking
References () https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944 - () https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944 - Broken Link
References () https://vuldb.com/?ctiid.316243 - () https://vuldb.com/?ctiid.316243 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.316243 - () https://vuldb.com/?id.316243 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.614355 - () https://vuldb.com/?submit.614355 - Third Party Advisory, VDB Entry
References () https://www.gnu.org/ - () https://www.gnu.org/ - Product
First Time Gnu
Gnu binutils
CPE cpe:2.3:a:gnu:binutils:2.45:*:*:*:*:*:*:*

15 Jul 2025, 20:15

Type Values Removed Values Added
References () https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1 - () https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1 -

15 Jul 2025, 13:14

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad clasificada como problemática en GNU Binutils 2.45. Esta vulnerabilidad afecta a la función copy_section del archivo binutils/objcopy.c. Esta manipulación provoca un desbordamiento del búfer en el montón. Es necesario atacar localmente. Se ha hecho público el exploit y puede que sea utilizado. El parche se llama 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. Se recomienda aplicar un parche para solucionar este problema.

13 Jul 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-13 22:15

Updated : 2025-07-30 15:59


NVD link : CVE-2025-7545

Mitre link : CVE-2025-7545

CVE.ORG link : CVE-2025-7545


JSON object : View

Products Affected

gnu

  • binutils
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-122

Heap-based Buffer Overflow