GDB 6.6 - Process_Coff_Symbol UPX File Buffer Overflow

Author: KaiJern Lau
type: remote
platform: linux
port: 
date_added: 2007-06-04  
date_updated: 2013-12-09  
verified: 1  
codes:   
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 30142.txt  
source: https://www.securityfocus.com/bid/24291/info

GDB is prone to a buffer-overflow vulnerability because it fails to properly check bounds when handling specially crafted executable files.

Attackers could leverage this issue to run arbitrary code outside of a restricted environment, which may lead to privilege escalation. Symantec has not confirmed code execution.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30142.zip