GNU Binutils is prone to an integer overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer.
Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely cause a denial-of-service condition.
GNU Binutils version 2.32 is vulnerable.
Information
GNU libiberty 0
GNU Binutils 2.32
Exploit
The researcher has created a proof-of-concept to demonstrate the issue. Please see the references for more information.
References: