CVE-2025-69644
Denial-of-Service in Binutils objdump via Malformed DWARF Data
Publication date: 2026-03-06
Last updated on: 2026-03-10
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gnu | binutils | to 2.46 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Binutils versions before 2.46, specifically in the objdump tool. It is caused by a logic flaw in how objdump processes DWARF location list headers within debug information of binary files. When objdump encounters a crafted binary with malformed debug information, it can enter an unbounded loop, producing endless output until manually stopped.
How can this vulnerability impact me? :
The vulnerability allows a local attacker to cause a denial-of-service by supplying a malicious input file to objdump. This results in excessive resource consumption as objdump enters an infinite loop and produces endless output, potentially disrupting normal operations or analysis workflows.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know