CVE-2025-69652
MEDIUM
6,2
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Attack Vector: local
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high
Description
AI Translation Available
GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an abort (SIGABRT) when processing a crafted ELF binary with malformed DWARF abbrev or debug information. Due to incomplete state cleanup in process_debug_info(), an invalid debug_info_p state may propagate into DWARF attribute parsing routines. When certain malformed attributes result in an unexpected data length of zero, byte_get_little_endian() triggers a fatal abort. No evidence of memory corruption or code execution was observed; the impact is limited to denial of service.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0002
Percentile
0,1th
Updated
EPSS Score Trend (Last 9 Days)
460
Improper Cleanup on Thrown Exception
DraftCommon Consequences
Security Scopes Affected:
Other
Potential Impacts:
Varies By Context
Applicable Platforms
Languages:
C, C#, C++, Java
Application
Binutils by Gnu
Version Range Affected
To
2.46
(inclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://sourceware.org/bugzilla/show_bug.cgi?id=33701
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=44b79abd0fa12e794725…