VYPR
Medium severity5.3NVD Advisory· Published Sep 27, 2025· Updated May 12, 2026

CVE-2025-11082

CVE-2025-11082

Description

A flaw has been found in GNU Binutils 2.45. Impacted is the function _bfd_elf_parse_eh_frame of the file bfd/elf-eh-frame.c of the component Linker. Executing manipulation can lead to heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. This patch is called ea1a0737c7692737a644af0486b71e4a392cbca8. A patch should be applied to remediate this issue. The code maintainer replied with "[f]ixed for 2.46".

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A heap-based buffer overflow in GNU Binutils 2.45 linker bug in _bfd buffer overflow in the ELF exception-handling parser allows local attackers to crash or execute code.

Vulnerability

CVE-2025-11082 is a heap-based buffer overflow vulnerability in GNU Binutils 2.45, specifically in the _bfd_elf_parse_eh_frame function within bfd/elf-eh-frame.c. The flaw resides in the linker component and can be triggered by processing a crafted ELF object file with malformed exception-handling frame data. The root cause is insufficient bounds checking when parsing the .eh_frame section, leading to a write past the allocated heap buffer boundary [1].

Exploitation

Exploitation requires local access to the system; the attacker must supply a specially crafted ELF file to the linker (e.g., during compilation or static linking). No authentication is needed beyond the ability to invoke the linker on the malicious input. The attack surface is limited to local execution, but the exploit has been published, lowering the barrier for potential attackers [1].

Impact

Successful exploitation can cause a heap-based buffer overflow, potentially leading to a crash (denial of service) or arbitrary code execution in the context of the linker process. This could allow an attacker to compromise the build environment or escalate privileges if the linker is invoked with elevated permissions [1].

Mitigation

The maintainer has confirmed the fix for Binutils 2.46, and a specific patch (commit ea1a0737c7692737a644af0486b71e4a392cbca8) is available. Users of Binutils 2.45 should apply the patch or upgrade to a patched version. Siemens has also acknowledged the vulnerability in its SIMATIC S7-1500 CPU family and related products, advising customers to apply the provided remediation as per their advisory [1].

References
  1. SSA-082556

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • GNU/Binutils2 versions
    cpe:2.3:a:gnu:binutils:2.45:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:gnu:binutils:2.45:*:*:*:*:*:*:*
    • (no CPE)range: <= 2.45

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.