![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.55529 |
Category: | Red Hat Local Security Checks |
Title: | RedHat Security Advisory RHSA-2005:709 |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing updates announced in advisory RHSA-2005:709. GDB, the GNU debugger, allows debugging of programs written in C, C++, and other languages by executing them in a controlled fashion, then printing their data. Several integer overflow bugs were found in gdb. If a user is tricked into processing a specially crafted executable file, it may allow the execution of arbitrary code as the user running gdb. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-1704 to this issue. A bug was found in the way gdb loads .gdbinit files. When a user executes gdb, the local directory is searched for a .gdbinit file which is then loaded. It is possible for a local user to execute arbitrary commands as the victim running gdb by placing a malicious .gdbinit file in a location where gdb may be run. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-1705 to this issue. This updated package also addresses the following issues: - - GDB on ia64 had previously implemented a bug fix to work-around a kernel problem when creating a core file via gcore. The bug fix caused a significant slow-down of gcore. - - GDB on ia64 issued an extraneous warning when gcore was used. - - GDB on ia64 could not backtrace over a sigaltstack. - - GDB on ia64 could not successfully do an info frame for a signal trampoline. - - GDB on AMD64 and Intel EM64T had problems attaching to a 32-bit process. - - GDB on AMD64 and Intel EM64T was not properly handling threaded watchpoints. - - GDB could not build with gcc4 when -Werror flag was set. - - GDB had problems printing inherited members of C++ classes. - - A few updates from mainline sources concerning Dwarf2 partial die in cache support, follow-fork support, interrupted syscall support, and DW_OP_piece read support. All users of gdb should upgrade to this updated package, which resolves these issues. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date http://rhn.redhat.com/errata/RHSA-2005-709.html Risk factor : High CVSS Score: 7.2 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2005-1704 BugTraq ID: 13697 http://www.securityfocus.com/bid/13697 Bugtraq: 20070404 VMSA-2007-0003 VMware ESX 3.0.1 and 3.0.0 server security updates (Google Search) http://www.securityfocus.com/archive/1/464745/100/0/threaded Conectiva Linux advisory: CLA-2006:1060 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001060 http://security.gentoo.org/glsa/glsa-200505-15.xml http://www.gentoo.org/security/en/glsa/glsa-200506-01.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:095 http://www.mandriva.com/security/advisories?name=MDKSA-2005:215 http://www.osvdb.org/16757 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9071 http://www.redhat.com/support/errata/RHSA-2005-659.html http://www.redhat.com/support/errata/RHSA-2005-673.html http://www.redhat.com/support/errata/RHSA-2005-709.html http://www.redhat.com/support/errata/RHSA-2005-763.html http://www.redhat.com/support/errata/RHSA-2005-801.html http://www.redhat.com/support/errata/RHSA-2006-0354.html http://www.redhat.com/support/errata/RHSA-2006-0368.html http://securitytracker.com/id?1016544 http://secunia.com/advisories/15527 http://secunia.com/advisories/17001 http://secunia.com/advisories/17072 http://secunia.com/advisories/17135 http://secunia.com/advisories/17257 http://secunia.com/advisories/17356 http://secunia.com/advisories/17718 http://secunia.com/advisories/18506 http://secunia.com/advisories/21122 http://secunia.com/advisories/21262 http://secunia.com/advisories/21717 http://secunia.com/advisories/24788 SGI Security Advisory: 20060703-01-P ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc http://www.trustix.org/errata/2005/0025/ https://usn.ubuntu.com/136-1/ http://www.vupen.com/english/advisories/2007/1267 Common Vulnerability Exposure (CVE) ID: CVE-2005-1705 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11072 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |