4.6
CVSSv2

CVE-2005-1704

Published: 24/05/2005 Updated: 19/10/2018
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the Binary File Descriptor (BFD) library for gdb prior to 6.3, binutils, elfutils, and possibly other packages, allows user-assisted malicious users to execute arbitrary code via a crafted object file that specifies a large number of section headers, leading to a heap-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu gdb

Vendor Advisories

Tavis Ormandy found an integer overflow in the GNU debugger By tricking an user into merely load a specially crafted executable, an attacker could exploit this to execute arbitrary code with the privileges of the user running gdb However, loading untrusted binaries without actually executing them is rather uncommon, so the risk of this flaw is lo ...
Tavis Ormandy found an integer overflow in the Binary File Descriptor (BFD) parser in the GNU debugger The same vulnerable code is also present in binutils By tricking an user into processing a specially crafted executable with the binutils tools (strings, objdump, nm, readelf, etc), an attacker could exploit this to execute arbitrary code with ...
Synopsis binutils security update Type/Severity Security Advisory: Low Topic An updated binutils package that fixes minor security issues is now availableThis update has been rated as having low security impact by the Red HatSecurity Response Team Description Binutils is a collection of u ...
Synopsis gdb security update Type/Severity Security Advisory: Low Topic An updated gdb package that fixes several bugs and minor security issues isnow availableThis update has been rated as having low security impact by the Red HatSecurity Response Team Description GDB, the GNU debugger, ...
Synopsis binutils security update Type/Severity Security Advisory: Low Topic An updated binutils package that fixes several bugs and minor securityissues is now availableThis update has been rated as having low security impact by the Red HatSecurity Response Team Description Binutils is a ...
Synopsis binutils security update Type/Severity Security Advisory: Low Topic An updated binutils package that fixes several bugs and minor securityissues is now availableThis update has been rated as having low security impact by the Red HatSecurity Response Team Description Binutils is a ...

References

CWE-189http://bugs.gentoo.org/show_bug.cgi?id=91398http://security.gentoo.org/glsa/glsa-200505-15.xmlhttp://www.gentoo.org/security/en/glsa/glsa-200506-01.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2005:095http://www.trustix.org/errata/2005/0025/http://www.redhat.com/support/errata/RHSA-2005-763.htmlhttp://www.redhat.com/support/errata/RHSA-2005-801.htmlhttp://secunia.com/advisories/15527http://secunia.com/advisories/17718http://www.osvdb.org/16757http://www.redhat.com/support/errata/RHSA-2005-659.htmlhttp://www.redhat.com/support/errata/RHSA-2005-673.htmlhttp://www.redhat.com/support/errata/RHSA-2005-709.htmlhttp://support.avaya.com/elmodocs2/security/ASA-2005-222.pdfhttp://secunia.com/advisories/17072http://secunia.com/advisories/17135http://secunia.com/advisories/17257http://secunia.com/advisories/17356http://secunia.com/advisories/17001http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001060http://www.securityfocus.com/bid/13697http://support.avaya.com/elmodocs2/security/ASA-2006-015.htmhttp://www.redhat.com/support/errata/RHSA-2006-0368.htmlhttp://securitytracker.com/id?1016544http://secunia.com/advisories/21122http://www.redhat.com/support/errata/RHSA-2006-0354.htmlftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.aschttp://secunia.com/advisories/21262http://support.avaya.com/elmodocs2/security/ASA-2006-178.htmhttp://secunia.com/advisories/21717http://www.vmware.com/support/vi3/doc/esx-55052-patch.htmlhttp://secunia.com/advisories/24788http://www.mandriva.com/security/advisories?name=MDKSA-2005:215http://www.vupen.com/english/advisories/2007/1267http://secunia.com/advisories/18506https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9071https://usn.ubuntu.com/136-1/http://www.securityfocus.com/archive/1/464745/100/0/threadedhttps://nvd.nist.govhttps://usn.ubuntu.com/135-1/