๐Ÿ” CVE Alert

CVE-2025-7545

MEDIUM 5.3

GNU Binutils objcopy.c copy_section heap-based overflow

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.

CWE CWE-122 CWE-119
Vendor gnu
Product binutils
Published Jul 13, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for gnu binutils

Be the first to know when new medium vulnerabilities affecting gnu binutils are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

GNU / Binutils
2.45

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.316243 vuldb.com: https://vuldb.com/?ctiid.316243 vuldb.com: https://vuldb.com/?submit.614355 sourceware.org: https://sourceware.org/bugzilla/show_bug.cgi?id=33049 sourceware.org: https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1 sourceware.org: https://sourceware.org/bugzilla/attachment.cgi?id=16117 sourceware.org: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944 gnu.org: https://www.gnu.org/ cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-082556.html

Credits

๐Ÿ” arthurx (VulDB User)