CVE-2019-7665
moderate-risk
Published 2019-02-09
In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes.
Do I need to act?
-
0.14% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.5/10
Medium
LOCAL
/ LOW complexity
Affected Products (19)
Affected Vendors
References (16)
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2197
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3575
Third Party Advisory
https://usn.ubuntu.com/4012-1/
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2197
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3575
Third Party Advisory
https://usn.ubuntu.com/4012-1/
38
/ 100
moderate-risk
Severity
18/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
19/34 · Moderate