binutils vulnerability allows remote Denial of Service attack
Summary
CERT-Bund has issued a security advisory regarding a vulnerability in GNU Binary Utilities (binutils) versions prior to 2.47. This vulnerability allows remote attackers to perform a Denial of Service attack. Mitigation is available.
What changed
CERT-Bund has released advisory WID-SEC-2026-0827 concerning a critical vulnerability in GNU Binary Utilities (binutils) versions earlier than 2.47. The vulnerability, with a CVSS Base Score of 6.1, enables remote, anonymous attackers to execute a Denial of Service (DoS) attack against affected systems. The advisory notes that remote attacks are possible, but the temporal score is 5.3.
Affected systems include Linux, UNIX, and other operating systems utilizing these GNU tools. Organizations using binutils versions prior to 2.47 should apply available mitigations to prevent DoS attacks. The advisory does not specify a compliance deadline but implies immediate action is necessary to address the security risk.
What to do next
- Update binutils to version 2.47 or later
- Apply available mitigations for binutils versions prior to 2.47
Archived snapshot
Mar 24, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
[WID-SEC-2026-0827] binutils: Schwachstelle ermöglicht Denial of Service CVSS Base Score 6.1 (mittel) CVSS Temporal Score 5.3 (mittel) Remoteangriff nein Datum 23.03.2026 Stand 24.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- Sonstiges
- UNIX
Produktbeschreibung
Die GNU Binary Utilities sind eine Sammlung von Programmierwerkzeugen für die Erzeugung und Manipulation von Programmen, Objektcode, Bibliotheken, Assemblersprache sowie Quellcode in verschiedenen Dateiformaten.
Produkte
23.03.2026
- Open Source binutils <2.47
Angriff
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in binutils ausnutzen, um einen Denial of Service Angriff durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Get daily alerts for CERT-Bund Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.