Miggo Logo

CVE-2025-1153: A vulnerability classified as problematic was found in GNU Binutils 2.43/2.44. Affected by this...

3.1

CVSS Score
3.1

Basic Information

EPSS Score
0.46884%
Published
2/10/2025
Updated
4/5/2025
KEV Status
No
Technology
-

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly names the affected function 'bfd_set_format' and the file 'format.c'. Although the commit information could not be fetched directly through the provided tools due to the URL format and bot protection on the gitweb interface, the description provides a strong indication of the vulnerable function. The patch ID is also provided, which would confirm this if its content were accessible. The confidence is 'medium' because the analysis relies on the textual description rather than direct patch analysis from commit diffs, which were unobtainable through the available tools for the given URL.

Steps taken:

  1. Attempted to fetch commit information using get_commit_infos for the patch URL https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150. This failed, likely due to the URL not being a direct commit page from a supported platform.
  2. Attempted to fetch the content of the patch URL using fetch_url_content. This was blocked by bot protection measures on the website.
  3. Relied on the provided vulnerability description, which explicitly states: "Affected by this vulnerability is the function bfd_set_format of the file format.c."
  4. Identified bfd_set_format in format.c as the vulnerable function based on this direct statement in the description.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility *l*ssi*i** *s pro*l*m*ti* w*s *oun* in *NU *inutils *.**/*.**. *****t** *y t*is vuln*r**ility is t** *un*tion ***_s*t_*orm*t o* t** *il* *orm*t.*. T** m*nipul*tion l***s to m*mory *orruption. T** *tt**k **n ** l*un**** r*mot*ly. T** *

Reasoning

T** vuln*r**ility **s*ription *xpli*itly n*m*s t** *****t** *un*tion '***_s*t_*orm*t' *n* t** *il* '*orm*t.*'. *lt*ou** t** *ommit in*orm*tion *oul* not ** **t**** *ir**tly t*rou** t** provi*** tools *u* to t** URL *orm*t *n* *ot prot**tion on t** *i