
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability was discovered in GNU Binutils version 2.43, specifically affecting the bfd_putl64 function in the bfd/libbfd.c file of the ld component. The vulnerability was disclosed on February 11, 2025, and has been assigned CVE-2025-1179. The issue allows for memory corruption through remote exploitation, though the attack complexity is considered high (NVD, Red Hat).
The vulnerability exists in the bfdputl64 function within the libbfd.c file, which can be triggered when using the -w option with a specially crafted input file. The issue has received a CVSS v3.1 base score of 5.0 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L. The vulnerability is classified as CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) (Red Hat, [Bugzilla](https://sourceware.org/bugzilla/showbug.cgi?id=32640)).
When exploited, the vulnerability leads to memory corruption through illegal memory access, potentially causing the linker to crash and resulting in denial of service. The attack can be launched remotely, though it requires high complexity and user interaction (NVD, Bugzilla).
The vulnerability has been fixed in GNU Binutils version 2.44. Users are recommended to upgrade to this version to address the issue. The code maintainer has confirmed that the bug was fixed between versions 2.43 and 2.44 (Bugzilla).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."