First published: Wed Jul 26 2017(Updated: )
Hanno Böck discovered that gdb incorrectly handled certain malformed AOUT headers in PE executables. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could use this issue to cause gdb to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only applied to Ubuntu 14.04 LTS. (CVE-2014-8501) It was discovered that gdb incorrectly handled printing bad bytes in Intel Hex objects. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could use this issue to cause gdb to crash, resulting in a denial of service. This issue only applied to Ubuntu 14.04 LTS. (CVE-2014-9939) It was discovered that gdb incorrectly handled certain string operations. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could use this issue to cause gdb to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only applied to Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-2226) It was discovered that gdb incorrectly handled parsing certain binaries. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could use this issue to cause gdb to crash, resulting in a denial of service. This issue only applied to Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-4487, CVE-2016-4488, CVE-2016-4489, CVE-2016-4490, CVE-2016-4492, CVE-2016-4493, CVE-2016-6131) It was discovered that gdb incorrectly handled parsing certain binaries. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could use this issue to cause gdb to crash, resulting in a denial of service. (CVE-2016-4491)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/gdb | <7.12.50.20170314-0ubuntu1.1 | 7.12.50.20170314-0ubuntu1.1 |
=17.04 | ||
All of | ||
ubuntu/gdb | <7.11.1-0ubuntu1~16.5 | 7.11.1-0ubuntu1~16.5 |
=16.04 | ||
All of | ||
ubuntu/gdb | <7.7.1-0ubuntu5~14.04.3 | 7.7.1-0ubuntu5~14.04.3 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for the gdb vulnerabilities is USN-3367-1.
gdb can handle malformed AOUT headers in PE executables by updating to version 7.12.50.20170314-0ubuntu1.1.
The remedy for the gdb vulnerability in Ubuntu 17.04 is to update to version 7.12.50.20170314-0ubuntu1.1.
The remedy for the gdb vulnerability in Ubuntu 16.04 is to update to version 7.11.1-0ubuntu1~16.5.
The remedy for the gdb vulnerability in Ubuntu 14.04 is to update to version 7.7.1-0ubuntu5~14.04.3.