{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-5245","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-05-27T08:07:06.452Z","datePublished":"2025-05-27T14:31:12.173Z","dateUpdated":"2026-05-12T12:02:26.882Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-05-27T14:31:12.173Z"},"title":"GNU Binutils objdump debug.c debug_type_samep memory corruption","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"GNU","product":"Binutils","versions":[{"version":"2.0","status":"affected"},{"version":"2.1","status":"affected"},{"version":"2.2","status":"affected"},{"version":"2.3","status":"affected"},{"version":"2.4","status":"affected"},{"version":"2.5","status":"affected"},{"version":"2.6","status":"affected"},{"version":"2.7","status":"affected"},{"version":"2.8","status":"affected"},{"version":"2.9","status":"affected"},{"version":"2.10","status":"affected"},{"version":"2.11","status":"affected"},{"version":"2.12","status":"affected"},{"version":"2.13","status":"affected"},{"version":"2.14","status":"affected"},{"version":"2.15","status":"affected"},{"version":"2.16","status":"affected"},{"version":"2.17","status":"affected"},{"version":"2.18","status":"affected"},{"version":"2.19","status":"affected"},{"version":"2.20","status":"affected"},{"version":"2.21","status":"affected"},{"version":"2.22","status":"affected"},{"version":"2.23","status":"affected"},{"version":"2.24","status":"affected"},{"version":"2.25","status":"affected"},{"version":"2.26","status":"affected"},{"version":"2.27","status":"affected"},{"version":"2.28","status":"affected"},{"version":"2.29","status":"affected"},{"version":"2.30","status":"affected"},{"version":"2.31","status":"affected"},{"version":"2.32","status":"affected"},{"version":"2.33","status":"affected"},{"version":"2.34","status":"affected"},{"version":"2.35","status":"affected"},{"version":"2.36","status":"affected"},{"version":"2.37","status":"affected"},{"version":"2.38","status":"affected"},{"version":"2.39","status":"affected"},{"version":"2.40","status":"affected"},{"version":"2.41","status":"affected"},{"version":"2.42","status":"affected"},{"version":"2.43","status":"affected"},{"version":"2.44","status":"affected"}],"modules":["objdump"]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical has been found in GNU Binutils up to 2.44. This affects the function debug_type_samep of the file /binutils/debug.c of the component objdump. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue."},{"lang":"de","value":"Es wurde eine Schwachstelle in GNU Binutils bis 2.44 entdeckt. Sie wurde als kritisch eingestuft. Es geht dabei um die Funktion debug_type_samep der Datei /binutils/debug.c der Komponente objdump. Durch Manipulation mit unbekannten Daten kann eine memory corruption-Schwachstelle ausgenutzt werden. Der Angriff muss lokal erfolgen. Der Exploit steht zur öffentlichen Verfügung. Als bestmögliche Massnahme wird Patching empfohlen."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.3,"vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-05-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-05-27T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-05-27T10:12:17.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"lcyf-fizz (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.310347","name":"VDB-310347 | GNU Binutils objdump debug.c debug_type_samep memory corruption","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.310347","name":"VDB-310347 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.584635","name":"Submit #584635 | GNU Binutils objdump 2.44 Memory Corruption","tags":["third-party-advisory"]},{"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32829","tags":["issue-tracking"]},{"url":"https://sourceware.org/bugzilla/attachment.cgi?id=16004","tags":["exploit"]},{"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a","tags":["patch"]},{"url":"https://www.gnu.org/","tags":["broken-link","product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-27T15:20:48.288532Z","id":"CVE-2025-5245","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-27T15:20:54.076Z"}},{"x_adpType":"supplier","providerMetadata":{"orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP","dateUpdated":"2026-05-12T12:02:26.882Z"},"affected":[{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 TM MFP - GNU/Linux subsystem","versions":[{"status":"affected","version":"0","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIPLUS S7-1500 CPU 1518-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-082556.html"}]}]}}