CVE-2024-25562

5.8 MEDIUM

📋 TL;DR

This vulnerability in Intel Distribution for GDB allows authenticated users to cause denial of service through improper buffer restrictions. It affects systems running vulnerable versions of this debugging software, requiring local access to exploit.

💻 Affected Systems

Products:
  • Intel Distribution for GDB
Versions: All versions before 2024.0.1
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where Intel Distribution for GDB is installed and used.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system instability or crash of the GDB debugging service, disrupting development and debugging workflows.

🟠

Likely Case

Local denial of service affecting the GDB process, potentially causing debugging sessions to fail.

🟢

If Mitigated

Minimal impact with proper access controls limiting local user privileges.

🌐 Internet-Facing: LOW - Requires local access and authenticated user privileges.
🏢 Internal Only: MEDIUM - Internal developers or users with local access could disrupt debugging operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated local access and knowledge of buffer manipulation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.0.1 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01075.html

Restart Required: Yes

Instructions:

1. Download Intel Distribution for GDB version 2024.0.1 or later from Intel's website. 2. Uninstall the vulnerable version. 3. Install the updated version. 4. Restart any affected systems or services.

🔧 Temporary Workarounds

Restrict local user access

linux

Limit which users can access and run the Intel GDB software

chmod 750 /path/to/gdb
setfacl -m u:username:rx /path/to/gdb

Disable vulnerable component

linux

Temporarily disable Intel GDB if not actively needed

systemctl stop intel-gdb-service
chmod 000 /path/to/gdb

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can execute GDB
  • Monitor system logs for abnormal GDB process behavior or crashes

🔍 How to Verify

Check if Vulnerable:

Check Intel GDB version with: gdb --version | grep 'Intel Distribution for GDB'

Check Version:

gdb --version

Verify Fix Applied:

Verify version is 2024.0.1 or higher: gdb --version

📡 Detection & Monitoring

Log Indicators:

  • GDB process crashes
  • Abnormal termination of debugging sessions
  • System logs showing buffer-related errors

Network Indicators:

  • None - local access only vulnerability

SIEM Query:

process_name:"gdb" AND (event_type:"crash" OR exit_code:139)

🔗 References

📤 Share & Export