Cyber Posture

CVE-2025-1179

MediumPublic PoC

Published: 11 February 2025

Published
11 February 2025
Modified
03 March 2025
KEV Added
Patch
CVSS Score 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
EPSS Score 0.0010 28.0th percentile
Risk Priority 10 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-1179 is a medium-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Gnu Binutils. Its CVSS base score is 5.0 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 28.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely identification, reporting, and correction of the memory corruption flaw in GNU Binutils 2.43 by upgrading to version 2.44.

detect

Requires regular vulnerability scanning to identify systems running the vulnerable GNU Binutils 2.43 affected by CVE-2025-1179.

prevent

Implements memory protection safeguards such as ASLR or DEP to mitigate exploitation of the memory corruption in bfd_putl64.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Memory corruption in Binutils ld enables code execution via malicious object file processing (T1203) or privilege escalation (T1068).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability was found in GNU Binutils 2.43. It has been rated as critical. Affected by this issue is the function bfd_putl64 of the file bfd/libbfd.c of the component ld. The manipulation leads to memory corruption. The attack may be…

more

launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. It is recommended to upgrade the affected component. The code maintainer explains, that "[t]his bug has been fixed at some point between the 2.43 and 2.44 releases".

Deeper analysisAI

CVE-2025-1179 is a critical vulnerability in GNU Binutils version 2.43 that affects the bfd_putl64 function in the file bfd/libbfd.c within the ld component. The issue results in memory corruption, mapped to CWE-119, and has a CVSS v3.1 base score of 5.0 (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).

The vulnerability enables remote attacks over the network by unauthenticated attackers requiring no privileges, though exploitation demands high complexity and user interaction. Successful exploitation achieves low-level impacts on confidentiality, integrity, and availability. While exploitation is considered difficult, an exploit has been publicly disclosed and may be used.

Advisories recommend upgrading to GNU Binutils version 2.44 to mitigate the issue, as the bug was fixed at some point between the 2.43 and 2.44 releases, according to the code maintainer. Details are available in Sourceware Bugzilla entries, including bug report 32640 and attachment 15915, along with VulDB references.

Details

CWE(s)

Affected Products

gnu
binutils
2.43

CVEs Like This One

CVE-2025-0840Same product: Gnu Binutils
CVE-2025-69649Same product: Gnu Binutils
CVE-2025-69650Same product: Gnu Binutils
CVE-2025-69195Same vendor: Gnu
CVE-2026-2776Shared CWE-119
CVE-2026-0861Same vendor: Gnu
CVE-2026-28372Same vendor: Gnu
CVE-2025-0689Same vendor: Gnu
CVE-2025-1125Same vendor: Gnu
CVE-2026-2778Shared CWE-119

References