Amazon Linux AMI : gdb (ALAS-2013-159)

Medium Nessus Plugin ID 69718

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

GDB tried to auto-load certain files (such as GDB scripts, Python scripts, and a thread debugging library) from the current working directory when debugging programs. This could result in the execution of arbitrary code with the user's privileges when GDB was run in a directory that has untrusted content. (CVE-2011-4355)

With this update, GDB no longer auto-loads files from the current directory and only trusts certain system directories by default. The list of trusted directories can be viewed and modified using the 'show auto-load safe-path' and 'set auto-load safe-path' GDB commands. Refer to the GDB manual, linked to in the References, for further information.

Solution

Run 'yum update gdb' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2013-159.html

Plugin Details

Severity: Medium

ID: 69718

File Name: ala_ALAS-2013-159.nasl

Version: 1.5

Type: local

Agent: unix

Published: 2013/09/04

Updated: 2018/04/18

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:gdb, p-cpe:/a:amazon:linux:gdb-debuginfo, p-cpe:/a:amazon:linux:gdb-gdbserver, cpe:/o:amazon:linux

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Patch Publication Date: 2013/03/02

Reference Information

CVE: CVE-2011-4355

ALAS: 2013-159

RHSA: 2013:0522