
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap-based buffer overflow vulnerability (CVE-2025-11082) was discovered in GNU Binutils version 2.45, specifically in the bfdelfparseeh_frame function within the bfd/elf-eh-frame.c file of the Linker component. The vulnerability was disclosed on September 27, 2025, and affects the GNU Binutils package (NVD).
The vulnerability is classified as a heap-based buffer overflow (CWE-122) and improper restriction of operations within memory buffer bounds (CWE-119). The CVSS v3.1 base score is 7.8 (High), with the following characteristics: Local attack vector, Low attack complexity, Low privileges required, No user interaction needed, and High impact on confidentiality, integrity, and availability. The vulnerability has been assigned CVSS vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD, Snyk).
The vulnerability can lead to a total loss of confidentiality, integrity, and availability of the affected system. When successfully exploited, it allows an attacker to gain access to sensitive information, modify protected files, and potentially cause complete system unavailability (Snyk).
A patch has been developed and is identified by commit ea1a0737c7692737a644af0486b71e4a392cbca8. The code maintainer has confirmed that the issue will be fixed in GNU Binutils version 2.46. Users are advised to apply the available patch to remediate this vulnerability (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."