3.3 CVE-2025-11839

Exploit
 

A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be exploited.
https://nvd.nist.gov/vuln/detail/CVE-2025-11839

Categories

CWE-252 : Unchecked Return Value
Two common programmer assumptions are "this function call can never fail" and "it doesn't matter if this function call fails". If an attacker can force the function to fail or otherwise return a value that is not expected, then the subsequent program logic could lead to a vulnerability, because the product is not in a state that the programmer assumes. For example, if the program calls a function to drop privileges but does not check the return code to ensure that privileges were successfully dropped, then the program will continue to operate with the higher privileges.

References

134c704f-9b21-4f2e-91b3-4a467353bcc0 Exploit

cna@vuldb.com Exploit


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:gnu:binutils:2.45:*:*:*:*:*:*:*


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
https://sourceware.org/bugzilla/show_bug.cgi?id=33448
https://sourceware.org/bugzilla/show_bug.cgi?id=33448


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry