CVE-2006-2362

7.3 HIGH
Published: May 15, 2006 Modified: April 16, 2026
View on NVD

Description

Buffer overflow in getsym in tekhex.c in libbfd in Free Software Foundation GNU Binutils before 20060423, as used by GNU strings, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a file with a crafted Tektronix Hex Format (TekHex) record in which the length character is not a valid hexadecimal character.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.apple.com/archives/security-announce/2007/Oct/msg00001.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://secunia.com/advisories/20188
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/20531
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/20550
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/22932
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/27441
Source: cve@mitre.org
Third Party Advisory
http://sourceware.org/bugzilla/show_bug.cgi?id=2584
Source: cve@mitre.org
Exploit Issue Tracking Third Party Advisory
http://www.mail-archive.com/bug-binutils%40gnu.org/msg01516.html
Source: cve@mitre.org
Issue Tracking Mailing List
http://www.securityfocus.com/bid/17950
Source: cve@mitre.org
Exploit Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018872
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.trustix.org/errata/2006/0034/
Source: cve@mitre.org
Broken Link
http://www.ubuntu.com/usn/usn-292-1
Source: cve@mitre.org
Broken Link
http://www.vupen.com/english/advisories/2006/1924
Source: cve@mitre.org
Permissions Required
http://www.vupen.com/english/advisories/2007/3665
Source: cve@mitre.org
Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/26644
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://lists.apple.com/archives/security-announce/2007/Oct/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://secunia.com/advisories/20188
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/20531
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/20550
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/22932
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/27441
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://sourceware.org/bugzilla/show_bug.cgi?id=2584
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Issue Tracking Third Party Advisory
http://www.mail-archive.com/bug-binutils%40gnu.org/msg01516.html
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Mailing List
http://www.novell.com/linux/security/advisories/2006_26_sr.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/17950
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018872
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.trustix.org/errata/2006/0034/
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.ubuntu.com/usn/usn-292-1
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2006/1924
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required
http://www.vupen.com/english/advisories/2007/3665
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/26644
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

32 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.3 / 10.0
EPSS (Exploit Probability)
5.5%
90th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

gnu