Lucene search

K
gentooGentoo FoundationGLSA-200505-15
HistoryMay 20, 2005 - 12:00 a.m.

gdb: Multiple vulnerabilities

2005-05-2000:00:00
Gentoo Foundation
security.gentoo.org
13

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

48.9%

Background

gdb is the GNU project’s debugger, facilitating the analysis and debugging of applications. The BFD library provides a uniform method of accessing a variety of object file formats.

Description

Tavis Ormandy of the Gentoo Linux Security Audit Team discovered an integer overflow in the BFD library, resulting in a heap overflow. A review also showed that by default, gdb insecurely sources initialisation files from the working directory.

Impact

Successful exploitation would result in the execution of arbitrary code on loading a specially crafted object file or the execution of arbitrary commands.

Workaround

There is no known workaround at this time.

Resolution

All gdb users should upgrade to the latest stable version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-devel/gdb-6.3-r3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-devel/gdb< 6.3-r3UNKNOWN

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

48.9%