Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2005-1704
Description:Integer overflow in the Binary File Descriptor (BFD) library for gdb before 6.3, binutils, elfutils, and possibly other packages, allows user-assisted attackers to execute arbitrary code via a crafted object file that specifies a large number of section headers, leading to a heap-based buffer overflow.
Test IDs: 1.3.6.1.4.1.25623.1.0.55526   1.3.6.1.4.1.25623.1.0.55566   1.3.6.1.4.1.25623.1.0.55740   1.3.6.1.4.1.25623.1.0.56176   1.3.6.1.4.1.25623.1.0.55905   1.3.6.1.4.1.25623.1.0.55662   1.3.6.1.4.1.25623.1.0.55456   1.3.6.1.4.1.25623.1.0.55529   1.3.6.1.4.1.25623.1.0.53969   1.3.6.1.4.1.25623.1.0.53970   1.3.6.1.4.1.25623.1.0.57244   1.3.6.1.4.1.25623.1.0.62309   1.3.6.1.4.1.25623.1.0.62292   1.3.6.1.4.1.25623.1.0.57122  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2005-1704
BugTraq ID: 13697
http://www.securityfocus.com/bid/13697
Bugtraq: 20070404 VMSA-2007-0003 VMware ESX 3.0.1 and 3.0.0 server security updates (Google Search)
http://www.securityfocus.com/archive/1/464745/100/0/threaded
Conectiva Linux advisory: CLA-2006:1060
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001060
http://security.gentoo.org/glsa/glsa-200505-15.xml
http://www.gentoo.org/security/en/glsa/glsa-200506-01.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:095
http://www.mandriva.com/security/advisories?name=MDKSA-2005:215
http://www.osvdb.org/16757
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9071
RedHat Security Advisories: RHSA-2005:659
http://www.redhat.com/support/errata/RHSA-2005-659.html
RedHat Security Advisories: RHSA-2005:673
http://www.redhat.com/support/errata/RHSA-2005-673.html
RedHat Security Advisories: RHSA-2005:709
http://www.redhat.com/support/errata/RHSA-2005-709.html
RedHat Security Advisories: RHSA-2005:763
http://www.redhat.com/support/errata/RHSA-2005-763.html
RedHat Security Advisories: RHSA-2005:801
http://www.redhat.com/support/errata/RHSA-2005-801.html
RedHat Security Advisories: RHSA-2006:0354
http://www.redhat.com/support/errata/RHSA-2006-0354.html
RedHat Security Advisories: RHSA-2006:0368
http://www.redhat.com/support/errata/RHSA-2006-0368.html
http://securitytracker.com/id?1016544
http://secunia.com/advisories/15527
http://secunia.com/advisories/17001
http://secunia.com/advisories/17072
http://secunia.com/advisories/17135
http://secunia.com/advisories/17257
http://secunia.com/advisories/17356
http://secunia.com/advisories/17718
http://secunia.com/advisories/18506
http://secunia.com/advisories/21122
http://secunia.com/advisories/21262
http://secunia.com/advisories/21717
http://secunia.com/advisories/24788
SGI Security Advisory: 20060703-01-P
ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
http://www.trustix.org/errata/2005/0025/
https://usn.ubuntu.com/136-1/
http://www.vupen.com/english/advisories/2007/1267




© 1998-2024 E-Soft Inc. All rights reserved.