{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-11413","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-07T10:40:46.002Z","datePublished":"2025-10-07T22:02:12.368Z","dateUpdated":"2026-05-12T12:02:49.813Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T06:49:14.455Z"},"title":"GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-125","lang":"en","description":"Out-of-Bounds Read"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"GNU","product":"Binutils","versions":[{"version":"2.45","status":"affected"},{"version":"2.46","status":"unaffected"}],"cpes":["cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*"],"modules":["Linker"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in GNU Binutils 2.45. Affected is the function elf_link_add_object_symbols of the file bfd/elflink.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. Upgrading to version 2.46 is able to address this issue. The patch is identified as 72efdf166aa0ed72ecc69fc2349af6591a7a19c0. Upgrading the affected component is advised."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":1.7,"vectorString":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2025-10-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-07T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-11-17T21:46:40.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Yifan Zhang (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.327349","name":"VDB-327349 | GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.327349","name":"VDB-327349 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.665587","name":"Submit #665587 | GNU Binutils 2.45 Out-of-Bounds Read","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.665590","name":"Submit #665590 | GNU Binutils 2.45 Heap-based Buffer Overflow (Duplicate)","tags":["third-party-advisory"]},{"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33452","tags":["issue-tracking"]},{"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33456#c10","tags":["issue-tracking"]},{"url":"https://sourceware.org/bugzilla/attachment.cgi?id=16362","tags":["exploit"]},{"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0","tags":["patch"]},{"url":"https://www.gnu.org/","tags":["product"]}],"tags":["x_open-source"]},"adp":[{"references":[{"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33452","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-08T14:38:58.101222Z","id":"CVE-2025-11413","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-08T17:34:48.460Z"}},{"x_adpType":"supplier","providerMetadata":{"orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP","dateUpdated":"2026-05-12T12:02:49.813Z"},"affected":[{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIPLUS S7-1500 CPU 1518-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-082556.html"}]}]}}