// For flags

CVE-2005-1704

 

Severity Score

4.6
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Integer overflow in the Binary File Descriptor (BFD) library for gdb before 6.3, binutils, elfutils, and possibly other packages, allows user-assisted attackers to execute arbitrary code via a crafted object file that specifies a large number of section headers, leading to a heap-based buffer overflow.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2005-05-24 CVE Reserved
  • 2005-05-24 CVE Published
  • 2024-04-30 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-189: Numeric Errors
CAPEC
References (40)
URL Date SRC
URL Date SRC
URL Date SRC
ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc 2018-10-19
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001060 2018-10-19
http://secunia.com/advisories/15527 2018-10-19
http://secunia.com/advisories/17001 2018-10-19
http://secunia.com/advisories/17072 2018-10-19
http://secunia.com/advisories/17135 2018-10-19
http://secunia.com/advisories/17257 2018-10-19
http://secunia.com/advisories/17356 2018-10-19
http://secunia.com/advisories/17718 2018-10-19
http://secunia.com/advisories/21122 2018-10-19
http://secunia.com/advisories/21262 2018-10-19
http://secunia.com/advisories/21717 2018-10-19
http://secunia.com/advisories/24788 2018-10-19
http://security.gentoo.org/glsa/glsa-200505-15.xml 2018-10-19
http://www.gentoo.org/security/en/glsa/glsa-200506-01.xml 2018-10-19
http://www.mandriva.com/security/advisories?name=MDKSA-2005:095 2018-10-19
http://www.mandriva.com/security/advisories?name=MDKSA-2005:215 2018-10-19
http://www.redhat.com/support/errata/RHSA-2005-659.html 2018-10-19
http://www.redhat.com/support/errata/RHSA-2005-673.html 2018-10-19
http://www.redhat.com/support/errata/RHSA-2005-709.html 2018-10-19
http://www.redhat.com/support/errata/RHSA-2005-763.html 2018-10-19
http://www.redhat.com/support/errata/RHSA-2005-801.html 2018-10-19
http://www.redhat.com/support/errata/RHSA-2006-0354.html 2018-10-19
http://www.redhat.com/support/errata/RHSA-2006-0368.html 2018-10-19
http://www.trustix.org/errata/2005/0025 2018-10-19
http://www.vupen.com/english/advisories/2007/1267 2018-10-19
https://usn.ubuntu.com/136-1 2018-10-19
https://access.redhat.com/security/cve/CVE-2005-1704 2006-07-20
https://bugzilla.redhat.com/show_bug.cgi?id=1617660 2006-07-20
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Gnu
Search vendor "Gnu"
Gdb
Search vendor "Gnu" for product "Gdb"
<= 6.3
Search vendor "Gnu" for product "Gdb" and version " <= 6.3"
r2
Affected