6.9
CVSSv2

CVE-2011-4355

Published: 05/03/2013 Updated: 13/02/2023
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

GNU Project Debugger (GDB) prior to 7.5, when .debug_gdb_scripts is defined, automatically loads certain files from the current working directory, which allows local users to gain privileges via crafted files such as Python scripts.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu gdb 6.1

gnu gdb 6.1.1

gnu gdb 5.2.1

gnu gdb 6.3

gnu gdb 5.1.1

gnu gdb 6.7.1

gnu gdb 6.2

gnu gdb 5.2

gnu gdb 4.18

gnu gdb 5.1

gnu gdb 7.3.1

gnu gdb 5.0

gnu gdb 7.2

gnu gdb 5.0.92

gnu gdb 6.5

gnu gdb 6.4

gnu gdb 7.4

gnu gdb 7.0

gnu gdb 6.8

gnu gdb 7.3

gnu gdb 6.2.1

gnu gdb 6.6

gnu gdb 7.0.1

gnu gdb 7.1

gnu gdb 5.0.93

gnu gdb 6.7

gnu gdb 5.3

gnu gdb 6.0

gnu gdb

Vendor Advisories

Synopsis Moderate: gdb security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated gdb packages that fix one security issue and three bugs are nowavailable for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact A Com ...
GDB tried to auto-load certain files (such as GDB scripts, Python scripts, and a thread debugging library) from the current working directory when debugging programs This could result in the execution of arbitrary code with the user's privileges when GDB was run in a directory that has untrusted content (CVE-2011-4355) With this update, GDB no lo ...