K01152385: Binutils Vulnerabilities CVE-2018-8945, CVE-2018-12697, CVE-2018-12698, CVE-2018-12699, and CVE-2018-12700
Total Page:16
File Type:pdf, Size:1020Kb
K01152385: Binutils vulnerabilities CVE-2018-8945, CVE-2018-12697, CVE-2018-12698, CVE-2018-12699, and CVE-2018-12700 Security Advisory Original Publication Date: Jul 23, 2018 Update Date: Jul 23, 2018 Security Advisory Description CVE-2018-8945 The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section. CVE-2018-12697 A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump. CVE-2018-12698 demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump. CVE-2018-12699 finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump. CVE-2018-12700 A Stack Exhaustion issue was discovered in debug_write_type in debug.c in GNU Binutils 2.30 because of DEBUG_KIND_INDIRECT infinite recursion. Impact The vulnerability allows remote attackers to cause a denial of service (DoS) on the affected system. Security Advisory Status F5 Product Development has assigned CPF-24951 and CPF-24952 (Traffix) to this vulnerability. To determine if your product and version have been evaluated for this vulnerability, refer to the Applies to (see versions) box. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table. For more information about security advisory versioning, refer to K51812227: Understanding Security Advisory versioning. Versions Fixes Vulnerable known to CVSSv3 Product Branch introduced Severity component be score1 in or feature vulnerable Not 13.x None BIG-IP (LTM, AAM, AFM, Analytics, applicable APM, ASM, DNS, Edge Gateway, FPS, Not Not 12.x None None None GTM, Link Controller, PEM, applicable vulnerable WebAccelerator) Not 11.x None applicable Not Not ARX 6.x None None None applicable vulnerable Not Not Enterprise Manager 3.x None None None applicable vulnerable Not 6.x None applicable Not Not BIG-IQ Centralized Management 5.x None None None applicable vulnerable Not 4.x None applicable Not Not BIG-IQ Cloud and Orchestration 1.x None None None applicable vulnerable Not Not F5 iWorkflow 2.x None None None applicable vulnerable 5.0.0 - 5.x None Traffix SDC 5.1.0 Low 3.3 BinUtils 4.x 4.4.0 None 1 The CVSSv3 score link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge. Security Advisory Recommended Actions If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Fixes introduced in column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists. Mitigation None Supplemental Information K51812227: Understanding Security Advisory versioning K41942608: Overview of Security Advisory articles K4602: Overview of the F5 security vulnerability response policy K9970: Subscribing to email notifications regarding F5 products K9957: Creating a custom RSS feed to view new and updated documents K21232150: Considerations for upgrading BIG-IQ or F5 iWorkflow systems Applies to: Product: BIG-IQ, BIG-IQ Centralized Management 6.0.0, 5.4.0, 5.3.0, 5.2.0, 5.1.0, 5.0.0, 4.6.0 Product: BIG-IP, BIG-IP AAM, BIG-IP AFM, BIG-IP Analytics, BIG-IP APM, BIG-IP ASM, BIG-IP DNS, BIG- IP Edge Gateway, BIG-IP FPS, BIG-IP GTM, BIG-IP Link Controller, BIG-IP LTM, BIG-IP PEM, BIG-IP WebAccelerator 13.1.0, 13.0.1, 13.0.0, 12.1.3, 12.1.2, 12.1.1, 12.1.0, 11.6.3, 11.6.2, 11.6.1, 11.5.7, 11.5.6, 11.5.5, 11.5.4, 11.5.3, 11.5.2, 11.5.1, 11.2.1 Product: Enterprise Manager 3.1.1 Product: F5 iWorkflow 2.3.0, 2.2.0, 2.1.0 Product: ARX, ARX 6.4.0, 6.3.0, 6.2.0 Product: Traffix SDC 5.1.0, 4.4.0 Product: BIG-IQ Cloud and Orchestration 1.0.0.