{"id":"USN-3367-1","summary":"gdb vulnerabilities","details":"Hanno Böck discovered that gdb incorrectly handled certain malformed AOUT\nheaders in PE executables. If a user or automated system were tricked into\nprocessing a specially crafted binary, a remote attacker could use this\nissue to cause gdb to crash, resulting in a denial of service, or possibly\nexecute arbitrary code. This issue only applied to Ubuntu 14.04 LTS.\n(CVE-2014-8501)\n\nIt was discovered that gdb incorrectly handled printing bad bytes in Intel\nHex objects. If a user or automated system were tricked into processing a\nspecially crafted binary, a remote attacker could use this issue to cause\ngdb to crash, resulting in a denial of service. This issue only applied to\nUbuntu 14.04 LTS. (CVE-2014-9939)\n\nIt was discovered that gdb incorrectly handled certain string operations.\nIf a user or automated system were tricked into processing a specially\ncrafted binary, a remote attacker could use this issue to cause gdb to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only applied to Ubuntu 14.04 LTS and Ubuntu 16.04 LTS.\n(CVE-2016-2226)\n\nIt was discovered that gdb incorrectly handled parsing certain binaries. If\na user or automated system were tricked into processing a specially crafted\nbinary, a remote attacker could use this issue to cause gdb to crash,\nresulting in a denial of service. This issue only applied to Ubuntu 14.04\nLTS and Ubuntu 16.04 LTS. (CVE-2016-4487, CVE-2016-4488, CVE-2016-4489,\nCVE-2016-4490, CVE-2016-4492, CVE-2016-4493, CVE-2016-6131)\n\nIt was discovered that gdb incorrectly handled parsing certain binaries. If\na user or automated system were tricked into processing a specially crafted\nbinary, a remote attacker could use this issue to cause gdb to crash,\nresulting in a denial of service. (CVE-2016-4491)\n","modified":"2026-02-10T04:41:11Z","published":"2017-07-26T16:37:24Z","related":["UBUNTU-CVE-2014-8501","UBUNTU-CVE-2014-9939","UBUNTU-CVE-2016-2226","UBUNTU-CVE-2016-4487","UBUNTU-CVE-2016-4488","UBUNTU-CVE-2016-4489","UBUNTU-CVE-2016-4490","UBUNTU-CVE-2016-4491","UBUNTU-CVE-2016-4492","UBUNTU-CVE-2016-4493","UBUNTU-CVE-2016-6131"],"upstream":["CVE-2014-8501","CVE-2014-9939","CVE-2016-2226","CVE-2016-4487","CVE-2016-4488","CVE-2016-4489","CVE-2016-4490","CVE-2016-4491","CVE-2016-4492","CVE-2016-4493","CVE-2016-6131","UBUNTU-CVE-2014-8501","UBUNTU-CVE-2014-9939","UBUNTU-CVE-2016-2226","UBUNTU-CVE-2016-4487","UBUNTU-CVE-2016-4488","UBUNTU-CVE-2016-4489","UBUNTU-CVE-2016-4490","UBUNTU-CVE-2016-4491","UBUNTU-CVE-2016-4492","UBUNTU-CVE-2016-4493","UBUNTU-CVE-2016-6131"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3367-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-8501"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-9939"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2226"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4487"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4488"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4489"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4490"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4491"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4492"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4493"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6131"}],"affected":[{"package":{"name":"gdb","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/gdb@7.7.1-0ubuntu5~14.04.3?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.7.1-0ubuntu5~14.04.3"}]}],"versions":["7.6.1-0ubuntu3","7.6.1-1ubuntu1","7.6.50.20131218-0ubuntu1","7.7-0ubuntu1","7.7-0ubuntu2","7.7-0ubuntu3","7.7-0ubuntu3.1","7.7.1-0ubuntu5~14.04.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"gdb","binary_version":"7.7.1-0ubuntu5~14.04.3"},{"binary_name":"gdb-minimal","binary_version":"7.7.1-0ubuntu5~14.04.3"},{"binary_name":"gdb-multiarch","binary_version":"7.7.1-0ubuntu5~14.04.3"},{"binary_name":"gdb-source","binary_version":"7.7.1-0ubuntu5~14.04.3"},{"binary_name":"gdb64","binary_version":"7.7.1-0ubuntu5~14.04.3"},{"binary_name":"gdbserver","binary_version":"7.7.1-0ubuntu5~14.04.3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3367-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"id":"CVE-2014-8501","severity":[{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2014-9939","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}]},{"id":"CVE-2016-2226","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-4487","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-4488","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-4489","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-4490","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-4491","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-4492","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-4493","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-6131","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}]}}},{"package":{"name":"gdb","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/gdb@7.11.1-0ubuntu1~16.5?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.11.1-0ubuntu1~16.5"}]}],"versions":["7.10-1ubuntu2","7.10-1ubuntu3","7.10.1-0ubuntu1","7.10.90.20160215-0ubuntu2","7.10.90.20160220-0ubuntu1","7.11-0ubuntu1","7.11.1-0ubuntu1~16.04"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"gdb","binary_version":"7.11.1-0ubuntu1~16.5"},{"binary_name":"gdb-multiarch","binary_version":"7.11.1-0ubuntu1~16.5"},{"binary_name":"gdb-source","binary_version":"7.11.1-0ubuntu1~16.5"},{"binary_name":"gdb64","binary_version":"7.11.1-0ubuntu1~16.5"},{"binary_name":"gdbserver","binary_version":"7.11.1-0ubuntu1~16.5"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3367-1.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"id":"CVE-2016-2226","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-4487","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-4488","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-4489","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-4490","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-4491","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-4492","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-4493","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-6131","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}]}}}],"schema_version":"1.7.3"}