Home
Bugtraq
Full List
Only Bugs
Only Tricks
Only Exploits
Only Dorks
Only CVE
Only CWE
Fake Notes
Ranking
CVEMAP
Full List
Show Vendors
Show Products
CWE Dictionary
Check CVE Id
Check CWE Id
Search
Bugtraq
CVEMAP
By author
CVE Id
CWE Id
By vendors
By products
RSS
Bugtraq
CVEMAP
CVE Products
Bugs
Exploits
Dorks
More
cIFrex
Facebook
Twitter
Donate
About
Submit
Vulnerabilities for
'GDB'
2019-07-24
CVE-2019-1010180
CWE-119
GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.
2017-06-21
CVE-2017-9778
CWE-770
GNU Debugger (GDB) 8.0 and earlier fails to detect a negative length field in a DWARF section. A malformed section in an ELF binary or a core file can cause GDB to repeatedly allocate memory until a process limit is reached. This can, for example, impede efforts to analyze malware with GDB.
2013-03-05
CVE-2011-4355
CWE-264
GNU Project Debugger (GDB) before 7.5, when .debug_gdb_scripts is defined, automatically loads certain files from the current working directory, which allows local users to gain privileges via crafted files such as Python scripts.
2006-08-31
CVE-2006-4146
CWE-119
Buffer overflow in the (1) DWARF (dwarfread.c) and (2) DWARF2 (dwarf2read.c) debugging code in GNU Debugger (GDB) 6.5 allows user-assisted attackers, or restricted users, to execute arbitrary code via a crafted file with a location block (DW_FORM_block) that contains a large number of operations.
2005-05-24
CVE-2005-1705
gdb before 6.3 searches the current working directory to load the .gdbinit configuration file, which allows local users to execute arbitrary commands as the user running gdb.
CVE-2005-1704
CWE-189
Integer overflow in the Binary File Descriptor (BFD) library for gdb before 6.3, binutils, elfutils, and possibly other packages, allows user-assisted attackers to execute arbitrary code via a crafted object file that specifies a large number of section headers, leading to a heap-based buffer overflow.
>>>
Vendor:
GNU
108
Products
INET
LIBC
Fingerd
Radius
WGET
BASH
Finger service
Gnumeric
GCC
MAKE
Emacs
Glibc
CVS
Mailman
Userv
Groff
Cfengine
Global
Privacy guard
ED
G++
Findutils
GZIP
TAR
Xemacs
Enscript
ZLIB
Sharutils
Chess
Fileutils
Flash player
GV
Screen
Data display debugger
Zebra
LSH
Libtool
Anubis
Libtasn1
FLIM
Aspell
Queue
Ksymoops
Gnats
Gettext
Mailutils
A2PS
Realtime linux security module
LESS
Gnubiff
Gnutls
Punbb
GIMP
Coreutils
CPIO
GDB
Phpbook
Texinfo
Gnump3d
Libextractor
Binutils
Libtool-ltdl
Gpgme
Gnumail
Iceweasel
Tramp
Libcdio
M4
SCCS
Grub legacy
ADNS
Ibackup
Escript
Classpath
Gnu screen
Automake
Grub 2
NANO
Gnash
Gnu patch
Eglibc
Libiberty
GREP
Libmicrohttpd
RUSH
GRUB
Readline
Patch
Parallel
Libidn
Grub2
Guile
OSIP
Gnutls libtasn1
Libssp
Ncurses
PSPP
Guixsd
Recutils
Libredwg
See all Products for Vendor
GNU
Copyright
2024
, cxsecurity.com
Back to Top