PatchSiren cyber security CVE debrief
CVE-2016-5034 Libdwarf Project CVE debrief
CVE-2016-5034 is a denial-of-service vulnerability in libdwarf’s dwarf_elf_access.c. According to NVD and the CVE description, crafted input files can trigger an out-of-bounds write while processing relocation records. NVD maps the issue to CWE-787 and rates the impact as availability-only with network-reachable conditions requiring user interaction to open or process the file. The vulnerable version range in NVD ends before 2016-09-23.
- Vendor
- Libdwarf Project
- Product
- CVE-2016-5034
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-17
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-17
- Advisory updated
- 2026-05-13
Who should care
Organizations and developers that embed libdwarf or process untrusted DWARF/ELF files should care most, especially if files can be supplied by remote users, received by email, or handled by automated build, analysis, or ingestion pipelines. Systems still running libdwarf versions older than 2016-09-23 are in scope per NVD’s affected-version range.
Technical summary
The flaw is an out-of-bounds write in libdwarf’s dwarf_elf_access.c, associated with relocation record handling. A crafted file can provoke the memory corruption condition and crash the consuming process, resulting in denial of service. NVD classifies the weakness as CWE-787 and gives CVSS 3.1 vector AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H.
Defensive priority
Medium. Prioritize to high if libdwarf is exposed to untrusted file ingestion or runs in services that process attacker-controlled DWARF/ELF content.
Recommended defensive actions
- Upgrade libdwarf to a version newer than 2016-09-23, per NVD’s affected-version range.
- Inventory applications and services that parse DWARF/ELF content using libdwarf, including build systems and file-analysis tools.
- Restrict processing of untrusted files to isolated, least-privilege environments where practical.
- Add regression tests for malformed or truncated relocation records and other invalid DWARF/ELF inputs.
- Monitor for unexpected crashes in file-parsing workflows and treat repeated parser failures as a security signal.
Evidence notes
The CVE description states that dwarf_elf_access.c in libdwarf before 20160923 allows remote attackers to cause a denial of service via a crafted file, related to relocation records. NVD lists CWE-787 and an affected range ending before 2016-09-23. The reference set includes the CVE record, the NVD detail page, two Openwall oss-security posts from 2016-05-24 and 2016-05-25, and the prevanders.net advisory page.
Official resources
-
CVE-2016-5034 CVE record
CVE.org
-
CVE-2016-5034 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Exploit, Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
Publicly disclosed in 2016 reference material and later recorded in the CVE/NVD record published on 2017-02-17. NVD’s version data indicates the issue was fixed before 2016-09-23.