GDB 6.6 - Process_Coff_Symbol UPX File Buffer Overflow
Author: KaiJern Lau type: remote platform: linux port: date_added: 2007-06-04 date_updated: 2013-12-09 verified: 1 codes: tags: aliases: screenshot_url: application_url: raw file: 30142.txt
source: https://www.securityfocus.com/bid/24291/info GDB is prone to a buffer-overflow vulnerability because it fails to properly check bounds when handling specially crafted executable files. Attackers could leverage this issue to run arbitrary code outside of a restricted environment, which may lead to privilege escalation. Symantec has not confirmed code execution. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30142.zip