Page 2 of 6 results (0.003 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Integer overflow in the Binary File Descriptor (BFD) library for gdb before 6.3, binutils, elfutils, and possibly other packages, allows user-assisted attackers to execute arbitrary code via a crafted object file that specifies a large number of section headers, leading to a heap-based buffer overflow. • ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc http://bugs.gentoo.org/show_bug.cgi?id=91398 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001060 http://secunia.com/advisories/15527 http://secunia.com/advisories/17001 http://secunia.com/advisories/17072 http://secunia.com/advisories/17135 http://secunia.com/advisories/17257 http://secunia.com/advisories/17356 http://secunia.com/advisories/17718 http://secunia.com/advisories/18506 http • CWE-189: Numeric Errors •