CVE-2025-11839
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-16

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing a manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-16
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-10-16
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gnu binutils 2.45
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-253 The product incorrectly checks a return value from a function, which prevents it from detecting errors or exceptional conditions.
CWE-252 The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a security flaw in GNU Binutils 2.45, specifically in the function tg_tag_type within the file prdbg.c. It involves an unchecked return value when performing certain manipulations. The vulnerability requires local access to exploit and the exploit code has been publicly released.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing an attacker with local access to cause a denial of service or other availability-related issues, as indicated by the CVSS scores showing an impact on availability but no impact on confidentiality or integrity.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart