Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4ED3BC91.7000608@redhat.com>
Date: Mon, 28 Nov 2011 09:53:37 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE assigned for gdb: arbitrary code execution via .debug_gdb_scripts

This issue is now public.

gdb: arbitrary code execution via .debug_gdb_scripts

https://bugzilla.redhat.com/show_bug.cgi?id=703238

Vincent Danen 
It was discovered [1],[2] the the GNU Debugger (gdb) would load
untrusted files
from the current working directory when .debug_gdb_scripts was defined. 
While
this was a design decision, it is an insecure one and users who do not
pre-inspect untrusted files may execute arbitrary code with their
privileges.

[1] http://sourceware.org/ml/gdb-patches/2011-04/msg00559.html
[2] http://sourceware.org/ml/gdb-patches/2011-05/msg00202.html

This issue has been assigned CVE-2011-4355

-- 

-Kurt Seifried / Red Hat Security Response Team


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.