Metrics
Affected Vendors & Products
Tue, 15 Jul 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Mon, 14 Jul 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Sun, 13 Jul 2025 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue. | |
Title | GNU Binutils objcopy.c copy_section heap-based overflow | |
Weaknesses | CWE-119 CWE-122 |
|
References |
|
|
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-07-13T21:44:08.027Z
Updated: 2025-07-15T19:53:03.699Z
Reserved: 2025-07-12T17:00:12.513Z
Link: CVE-2025-7545

Updated: 2025-07-14T16:43:42.032Z

Status : Awaiting Analysis
Published: 2025-07-13T22:15:23.873
Modified: 2025-07-15T20:15:53.893
Link: CVE-2025-7545
