Miggo Logo

CVE-2021-32256:
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.36. It is a stack...

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.31133%
Published
7/18/2023
Updated
4/4/2024
KEV Status
No
Technology
-

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis is based on the provided vulnerability description and, crucially, the stack trace from the Launchpad bug report. The stack trace clearly indicates the functions involved in the stack overflow. 'demangle_type' is identified as the primary vulnerable function due to its recursive nature and direct involvement in the overflow. 'peek' and 'next' are included as they are part of the call chain that processes the malicious input and leads to the vulnerability in 'demangle_type'. Confidence is high for 'demangle_type' as it's explicitly named in the vulnerability description and stack trace as the site of the overflow. Confidence is medium for 'peek' and 'next' as they are precursors in the stack trace but not the direct cause of the overflow itself. No commit information was available, so the analysis relies on the bug report details.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* w*s *is*ov*r** in *NU li*i**rty, *s *istri*ut** in *NU *inutils *.**. It is * st**k-ov*r*low issu* in **m*n*l*_typ* in rust-**m*n*l*.*.

Reasoning

T** *n*lysis is **s** on t** provi*** vuln*r**ility **s*ription *n*, *ru*i*lly, t** st**k tr*** *rom t** L*un**p** *u* r*port. T** st**k tr*** *l**rly in*i**t*s t** *un*tions involv** in t** st**k ov*r*low. '**m*n*l*_typ*' is i**nti*i** *s t** prim*r