Gnu

Gdb

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Veröffentlicht 25.07.2023 19:15:11
  • Zuletzt bearbeitet 21.11.2024 08:14:46

GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a stack overflow via the function ada_decode at /gdb/ada-lang.c.

  • EPSS 0.02%
  • Veröffentlicht 25.07.2023 19:15:11
  • Zuletzt bearbeitet 21.11.2024 08:14:46

GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap use after free via the function add_pe_exported_sym() at /gdb/coff-pe-read.c.

  • EPSS 0.02%
  • Veröffentlicht 25.07.2023 19:15:11
  • Zuletzt bearbeitet 21.11.2024 08:14:46

GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap buffer overflow via the function pe_as16() at /gdb/coff-pe-read.c.

Exploit
  • EPSS 0.38%
  • Veröffentlicht 24.07.2019 13:15:10
  • Zuletzt bearbeitet 21.11.2024 04:18:01

GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging....

  • EPSS 0.3%
  • Veröffentlicht 21.06.2017 07:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

GNU Debugger (GDB) 8.0 and earlier fails to detect a negative length field in a DWARF section. A malformed section in an ELF binary or a core file can cause GDB to repeatedly allocate memory until a process limit is reached. This can, for example, im...

  • EPSS 0.16%
  • Veröffentlicht 05.03.2013 21:38:53
  • Zuletzt bearbeitet 11.04.2025 00:51:21

GNU Project Debugger (GDB) before 7.5, when .debug_gdb_scripts is defined, automatically loads certain files from the current working directory, which allows local users to gain privileges via crafted files such as Python scripts.

  • EPSS 1.26%
  • Veröffentlicht 31.08.2006 22:04:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in the (1) DWARF (dwarfread.c) and (2) DWARF2 (dwarf2read.c) debugging code in GNU Debugger (GDB) 6.5 allows user-assisted attackers, or restricted users, to execute arbitrary code via a crafted file with a location block (DW_FORM_blo...

  • EPSS 0.22%
  • Veröffentlicht 24.05.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Integer overflow in the Binary File Descriptor (BFD) library for gdb before 6.3, binutils, elfutils, and possibly other packages, allows user-assisted attackers to execute arbitrary code via a crafted object file that specifies a large number of sect...

  • EPSS 0.06%
  • Veröffentlicht 24.05.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

gdb before 6.3 searches the current working directory to load the .gdbinit configuration file, which allows local users to execute arbitrary commands as the user running gdb.