{"api_version":"1","generated_at":"2026-04-22T23:08:59+00:00","cve":"CVE-2006-4146","urls":{"html":"https://cve.report/CVE-2006-4146","api":"https://cve.report/api/cve/CVE-2006-4146.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-4146","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-4146"},"summary":{"title":"CVE-2006-4146","description":"Buffer overflow in the (1) DWARF (dwarfread.c) and (2) DWARF2 (dwarf2read.c) debugging code in GNU Debugger (GDB) 6.5 allows user-assisted attackers, or restricted users, to execute arbitrary code via a crafted file with a location block (DW_FORM_block) that contains a large number of operations.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2006-08-31 22:04:00","updated_at":"2017-10-11 01:31:00"},"problem_types":["CWE-119"],"metrics":[],"references":[{"url":"http://www.redhat.com/support/errata/RHSA-2007-0469.html","name":"RHSA-2007:0469","refsource":"REDHAT","tags":[],"title":"Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc","name":"20070602-01-P","refsource":"SGI","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://secunia.com/advisories/22205","name":"22205","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"Ubuntu update for gdb - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1017138","name":"1017138","refsource":"SECTRACK","tags":[],"title":"Apple Xcode GDB DWARF Binary Bug Lets Remote Users Execute Arbitrary Code - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/19802","name":"19802","refsource":"BID","tags":[],"title":"GDB DWARF Multiple Buffer Overflow Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.vupen.com/english/advisories/2007/3229","name":"ADV-2007-3229","refsource":"VUPEN","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/25632","name":"25632","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"Red Hat update for gdb - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/25894","name":"25894","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"SGI Advanced Linux Environment Multiple Updates - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html","name":"20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player","refsource":"FULLDISC","tags":[],"title":"[Full-Disclosure] Mailing List Charter","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://www.vupen.com/english/advisories/2006/3433","name":"ADV-2006-3433","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/26909","name":"26909","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"VMware ESX Server Multiple Security Updates - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://security.gentoo.org/glsa/glsa-200711-23.xml","name":"GLSA-200711-23","refsource":"GENTOO","tags":[],"title":"Gentoo Linux Documentation\n--\n  VMware Workstation and Player: Multiple vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/4283","name":"ADV-2006-4283","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/27706","name":"27706","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"Gentoo update for vmware - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10463","name":"oval:org.mitre.oval:def:10463","refsource":"OVAL","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.apple.com/archives/security-announce/2006/Oct/msg00000.html","name":"APPLE-SA-2006-10-31","refsource":"APPLE","tags":[],"title":"APPLE-SA-2006-10-31 Xcode Tools 2.4.1","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/25098","name":"25098","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"Red Hat Update for Multiple Packages - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-253.htm","name":"http://support.avaya.com/elmodocs2/security/ASA-2007-253.htm","refsource":"CONFIRM","tags":[],"title":"ASA-2007-253 (RHSA-2007-0229)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22662","name":"22662","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"Apple Xcode GDB \"DWARF\" Buffer Overflow - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/25934","name":"25934","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"Avaya Products GDB \"DWARF\" Buffer Overflow Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/28318","name":"28318","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://secunia.com/advisories/21713","name":"21713","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"GDB \"DWARF\" Buffer Overflow Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/usn-356-1","name":"USN-356-1","refsource":"UBUNTU","tags":[],"title":"usn/usn-356-1 - Ubuntu: Linux for human beings","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204841","name":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204841","refsource":"CONFIRM","tags":["Patch"],"title":"204841 – CVE-2006-4146 GDB buffer overflow","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://docs.info.apple.com/article.html?artnum=304669","name":"http://docs.info.apple.com/article.html?artnum=304669","refsource":"CONFIRM","tags":[],"title":"About the security content of Xcode Tools 2.4.1","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0229.html","name":"RHSA-2007:0229","refsource":"REDHAT","tags":[],"title":"Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-4146","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-4146","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"4146","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"gdb","cpe6":"6.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"4146","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"gdb","cpe6":"6.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[{"cvename":"CVE-2006-4146","organization":"Red Hat","lastmodified":"2009-06-01","contributor":"Mark J Cox","statementText":"Updates to address this issue are available for Red Hat Enterprise Linux 3 and 4: https://rhn.redhat.com/cve/CVE-2006-4146.html Red Hat Enterprise Linux 5 was not vulnerable to this issue as it contained a backported patch.","cve_year":"2006","cve_id":"4146","crc32":"a3869eec"}],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-4146","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Buffer overflow in the (1) DWARF (dwarfread.c) and (2) DWARF2 (dwarf2read.c) debugging code in GNU Debugger (GDB) 6.5 allows user-assisted attackers, or restricted users, to execute arbitrary code via a crafted file with a location block (DW_FORM_block) that contains a large number of operations."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player","refsource":"FULLDISC","url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"},{"name":"ADV-2006-4283","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/4283"},{"name":"25098","refsource":"SECUNIA","url":"http://secunia.com/advisories/25098"},{"name":"GLSA-200711-23","refsource":"GENTOO","url":"http://security.gentoo.org/glsa/glsa-200711-23.xml"},{"name":"25894","refsource":"SECUNIA","url":"http://secunia.com/advisories/25894"},{"name":"RHSA-2007:0469","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2007-0469.html"},{"name":"ADV-2007-3229","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/3229"},{"name":"APPLE-SA-2006-10-31","refsource":"APPLE","url":"http://lists.apple.com/archives/security-announce/2006/Oct/msg00000.html"},{"name":"28318","refsource":"OSVDB","url":"http://www.osvdb.org/28318"},{"name":"1017138","refsource":"SECTRACK","url":"http://securitytracker.com/id?1017138"},{"name":"http://support.avaya.com/elmodocs2/security/ASA-2007-253.htm","refsource":"CONFIRM","url":"http://support.avaya.com/elmodocs2/security/ASA-2007-253.htm"},{"name":"oval:org.mitre.oval:def:10463","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10463"},{"name":"RHSA-2007:0229","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2007-0229.html"},{"name":"22662","refsource":"SECUNIA","url":"http://secunia.com/advisories/22662"},{"name":"25632","refsource":"SECUNIA","url":"http://secunia.com/advisories/25632"},{"name":"25934","refsource":"SECUNIA","url":"http://secunia.com/advisories/25934"},{"name":"http://docs.info.apple.com/article.html?artnum=304669","refsource":"CONFIRM","url":"http://docs.info.apple.com/article.html?artnum=304669"},{"name":"ADV-2006-3433","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/3433"},{"name":"26909","refsource":"SECUNIA","url":"http://secunia.com/advisories/26909"},{"name":"27706","refsource":"SECUNIA","url":"http://secunia.com/advisories/27706"},{"name":"21713","refsource":"SECUNIA","url":"http://secunia.com/advisories/21713"},{"name":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204841","refsource":"CONFIRM","url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204841"},{"name":"22205","refsource":"SECUNIA","url":"http://secunia.com/advisories/22205"},{"name":"19802","refsource":"BID","url":"http://www.securityfocus.com/bid/19802"},{"name":"20070602-01-P","refsource":"SGI","url":"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"},{"name":"USN-356-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/usn-356-1"}]}},"nvd":{"publishedDate":"2006-08-31 22:04:00","lastModifiedDate":"2017-10-11 01:31:00","problem_types":["CWE-119"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":5.1},"severity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gnu:gdb:6.5:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"4146","Ordinal":"19472","Title":"CVE-2006-4146","CVE":"CVE-2006-4146","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"4146","Ordinal":"1","NoteData":"Buffer overflow in the (1) DWARF (dwarfread.c) and (2) DWARF2 (dwarf2read.c) debugging code in GNU Debugger (GDB) 6.5 allows user-assisted attackers, or restricted users, to execute arbitrary code via a crafted file with a location block (DW_FORM_block) that contains a large number of operations.","Type":"Description","Title":null},{"CveYear":"2006","CveId":"4146","Ordinal":"2","NoteData":"2006-08-31","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"4146","Ordinal":"3","NoteData":"2017-10-09","Type":"Other","Title":"Modified"}]}}}