Lucene search

K

5 matches found

CVE
CVE
added 2019/07/24 1:15 p.m.237 views

CVE-2019-1010180

GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.

7.8CVSS7.7AI score0.00396EPSS
CVE
CVE
added 2013/03/05 9:38 p.m.80 views

CVE-2011-4355

GNU Project Debugger (GDB) before 7.5, when .debug_gdb_scripts is defined, automatically loads certain files from the current working directory, which allows local users to gain privileges via crafted files such as Python scripts.

6.9CVSS8.7AI score0.00163EPSS
CVE
CVE
added 2017/06/21 7:29 a.m.65 views

CVE-2017-9778

GNU Debugger (GDB) 8.0 and earlier fails to detect a negative length field in a DWARF section. A malformed section in an ELF binary or a core file can cause GDB to repeatedly allocate memory until a process limit is reached. This can, for example, impede efforts to analyze malware with GDB.

5.5CVSS5.4AI score0.00298EPSS
CVE
CVE
added 2005/05/24 4:0 a.m.52 views

CVE-2005-1704

Integer overflow in the Binary File Descriptor (BFD) library for gdb before 6.3, binutils, elfutils, and possibly other packages, allows user-assisted attackers to execute arbitrary code via a crafted object file that specifies a large number of section headers, leading to a heap-based buffer overf...

4.6CVSS9.8AI score0.00222EPSS
CVE
CVE
added 2005/05/24 4:0 a.m.39 views

CVE-2005-1705

gdb before 6.3 searches the current working directory to load the .gdbinit configuration file, which allows local users to execute arbitrary commands as the user running gdb.

7.2CVSS9.2AI score0.00057EPSS