Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11413: Out-of-Bounds Read in GNU Binutils

0
Medium
VulnerabilityCVE-2025-11413cvecve-2025-11413
Published: Tue Oct 07 2025 (10/07/2025, 22:02:12 UTC)
Source: CVE Database V5
Vendor/Project: GNU
Product: Binutils

Description

A vulnerability was found in GNU Binutils 2.45. Affected is the function elf_link_add_object_symbols of the file bfd/elflink.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. Upgrading to version 2.46 is able to address this issue. The patch is identified as 72efdf166aa0ed72ecc69fc2349af6591a7a19c0. Upgrading the affected component is advised.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 21:55:58 UTC

Technical Analysis

CVE-2025-11413 identifies an out-of-bounds read vulnerability in GNU Binutils version 2.45, specifically within the elf_link_add_object_symbols function in the bfd/elflink.c source file of the linker component. Binutils is a widely used collection of binary tools essential for compiling and linking software on Unix-like systems. The vulnerability arises from improper bounds checking when adding object symbols during the linking process, allowing a local attacker with low privileges to read memory outside the intended buffer. This out-of-bounds read could potentially expose sensitive information residing in adjacent memory areas, which might be leveraged for further exploitation or information disclosure attacks. The attack vector is local, requiring the attacker to have some level of access to the system, but no user interaction or elevated privileges beyond low-level local access are necessary. The vulnerability does not directly allow code execution or privilege escalation but can weaken system security posture by leaking memory contents. The issue has been publicly disclosed, and a patch has been released in GNU Binutils version 2.46, identified by commit 72efdf166aa0ed72ecc69fc2349af6591a7a19c0. Users of affected versions are strongly advised to upgrade to the patched release to eliminate the vulnerability.

Potential Impact

The primary impact of CVE-2025-11413 is the potential disclosure of sensitive memory contents due to an out-of-bounds read. While it does not directly compromise system integrity or availability, the leaked information could be used by attackers to facilitate further attacks such as privilege escalation, code execution, or bypassing security controls. Since exploitation requires local access with low privileges, the threat is mainly to multi-user systems, development environments, and servers where untrusted users have shell or local access. The vulnerability affects organizations relying on GNU Binutils 2.45 for software development, system building, or embedded systems. The risk is heightened in environments where attackers can gain initial local footholds, such as shared hosting, CI/CD pipelines, or developer workstations. The medium CVSS score of 4.8 reflects the moderate severity due to limited attack scope and complexity. However, failure to patch could enable attackers to gather sensitive data that aids in more severe exploits.

Mitigation Recommendations

To mitigate CVE-2025-11413, organizations should upgrade GNU Binutils to version 2.46 or later, where the vulnerability is patched. For environments where immediate upgrade is not feasible, restricting local access to trusted users only and monitoring for unusual linker activity can reduce risk. Employing strict access controls and sandboxing developer or build environments limits potential attacker presence. Additionally, auditing build and linking processes for unexpected inputs or malformed object files can help detect exploitation attempts. Integrating automated patch management and vulnerability scanning for development toolchains ensures timely identification and remediation of such vulnerabilities. Organizations should also educate developers and system administrators about the risks of using outdated toolchains and enforce policies to maintain up-to-date software components.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-07T10:40:46.002Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e590fca677756fc9a3f98b

Added to database: 10/7/2025, 10:15:24 PM

Last enriched: 2/24/2026, 9:55:58 PM

Last updated: 3/22/2026, 4:50:07 PM

Views: 168

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses