Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-4355

Опубликовано: 05 мар. 2013
Источник: debian
EPSS Низкий

Описание

GNU Project Debugger (GDB) before 7.5, when .debug_gdb_scripts is defined, automatically loads certain files from the current working directory, which allows local users to gain privileges via crafted files such as Python scripts.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gdbfixed7.6-1package

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=703238

  • https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=blob_plain;f=gdb/NEWS;hb=HEAD (lists "auto-load safe-path" under "Changes in GDB 7.5")

EPSS

Процентиль: 38%
0.00163
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

GNU Project Debugger (GDB) before 7.5, when .debug_gdb_scripts is defined, automatically loads certain files from the current working directory, which allows local users to gain privileges via crafted files such as Python scripts.

redhat
больше 14 лет назад

GNU Project Debugger (GDB) before 7.5, when .debug_gdb_scripts is defined, automatically loads certain files from the current working directory, which allows local users to gain privileges via crafted files such as Python scripts.

nvd
больше 12 лет назад

GNU Project Debugger (GDB) before 7.5, when .debug_gdb_scripts is defined, automatically loads certain files from the current working directory, which allows local users to gain privileges via crafted files such as Python scripts.

github
больше 3 лет назад

GNU Project Debugger (GDB) before 7.5, when .debug_gdb_scripts is defined, automatically loads certain files from the current working directory, which allows local users to gain privileges via crafted files such as Python scripts.

oracle-oval
больше 12 лет назад

ELSA-2013-0522: gdb security and bug fix update (MODERATE)

EPSS

Процентиль: 38%
0.00163
Низкий