GNU GDB is prone to a buffer-overflow vulnerability.
Attackers can exploit this issue to execute arbitrary code within the context of the affected application or obtain sensitive information. Failed exploits will result in denial-of-service condition.
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.
Solution:
Reportedly, the issue is fixed; however, Symantec has not confirmed this. Please contact the vendor for more information.
Bugtraq ID: | 109367 |
Class: | Boundary Condition Error |
CVE: | CVE-2019-1010180 |
Remote: | Yes |
Local: | No |
Published: | Jul 24 2019 12:00AM |
Updated: | Jul 24 2019 12:00AM |
Credit: | The vendor reported this issue. |
Vulnerable: | GNU GDB 8.2.1 GNU GDB 8.1.1 GNU GDB 8.0.1 GNU GDB 7.5.1 GNU GDB 6.7.1 GNU GDB 6.4 GNU GDB 6.3 + Ubuntu Ubuntu Linux 5.0 4 powerpc + Ubuntu Ubuntu Linux 5.0 4 i386 + Ubuntu Ubuntu Linux 5.0 4 amd64 GNU GDB 6.2.1 + Ubuntu Ubuntu Linux 4.1 ppc + Ubuntu Ubuntu Linux 4.1 ia64 + Ubuntu Ubuntu Linux 4.1 ia32 GNU GDB 6.2 GNU GDB 6.1.1 + Ubuntu Ubuntu Linux 4.1 ppc + Ubuntu Ubuntu Linux 4.1 ia64 + Ubuntu Ubuntu Linux 4.1 ia32 GNU GDB 6.1 + Ubuntu Ubuntu Linux 4.1 ppc + Ubuntu Ubuntu Linux 4.1 ia64 + Ubuntu Ubuntu Linux 4.1 ia32 GNU GDB 8.3 GNU GDB 8.2 GNU GDB 8.1 GNU GDB 8.0 GNU GDB 7.7 GNU GDB 7.5 GNU GDB 7.4.1 GNU GDB 7.4 GNU GDB 7.3.1 GNU GDB 7.3 GNU GDB 7.0.1 GNU GDB 7.0 GNU GDB 6.8 GNU GDB 6.7 GNU GDB 6.6 GNU GDB 6.4 GNU GDB 6.2 GNU GDB 6.1 GNU GDB 6.0 + Ubuntu Ubuntu Linux 4.1 ppc + Ubuntu Ubuntu Linux 4.1 ia64 + Ubuntu Ubuntu Linux 4.1 ia32 GNU GDB 5.2 GNU GDB 5.1.1 GNU GDB 5.1 GNU GDB 5.0.93 GNU GDB 5.0.92 GNU GDB 4.18 |
Not Vulnerable: |
from SecurityFocus Vulnerabilities https://ift.tt/32N9XGE
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.