First published: Thu Aug 31 2006(Updated: )
Buffer overflow in the (1) DWARF (dwarfread.c) and (2) DWARF2 (dwarf2read.c) debugging code in GNU Debugger (GDB) 6.5 allows user-assisted attackers, or restricted users, to execute arbitrary code via a crafted file with a location block (DW_FORM_block) that contains a large number of operations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU gdb | =6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4146 is considered to have a high severity due to the potential for arbitrary code execution.
To fix CVE-2006-4146, upgrade to a patched version of GNU Debugger (GDB) later than 6.5.
CVE-2006-4146 primarily affects GNU Debugger (GDB) version 6.5.
CVE-2006-4146 can be exploited by user-assisted attackers or restricted users through crafted files.
Exploiting CVE-2006-4146 can lead to the execution of arbitrary code, which may compromise the affected system.