Format string vulnerability in the host chooser window (gdmchooser) in GNOME Foundation Display Manager (gdm) allows local users to execute arbitrary code via format string specifiers in a hostname, which are used in an error dialog.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Format string vulnerability in the host chooser window (gdmchooser) in GNOME Foundation Display Manager (gdm) allows local users to execute arbitrary code via format string specifiers in a hostname, which are used in an error dialog.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://secunia.com/advisories/23385 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/23387 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.vupen.com/english/advisories/2006/5015 | vdb-entry x_refsource_VUPEN x_transferred |
http://secunia.com/advisories/23409 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://securitytracker.com/id?1017383 | vdb-entry x_refsource_SECTRACK x_transferred |
http://securitytracker.com/id?1017320 | vdb-entry x_refsource_SECTRACK x_transferred |
http://www.osvdb.org/30848 | vdb-entry x_refsource_OSVDB x_transferred |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30896 | vdb-entry x_refsource_XF x_transferred |
http://www.securityfocus.com/bid/21597 | vdb-entry x_refsource_BID x_transferred |
http://secunia.com/advisories/23381 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=453 | third-party-advisory x_refsource_IDEFENSE x_transferred |
http://www.novell.com/linux/security/advisories/2006_29_sr.html | vendor-advisory x_refsource_SUSE x_transferred |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:231 | vendor-advisory x_refsource_MANDRIVA x_transferred |
http://ftp.acc.umu.se/pub/GNOME/sources/gdm/2.17/gdm-2.17.4.news | x_refsource_CONFIRM x_transferred |
http://www.ubuntu.com/usn/usn-396-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
Format string vulnerability in the host chooser window (gdmchooser) in GNOME Foundation Display Manager (gdm) allows local users to execute arbitrary code via format string specifiers in a hostname, which are used in an error dialog.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 4.3 | MEDIUM | AV:L/AC:L/Au:S/C:P/I:P/A:P |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-Other | Primary | nvd@nist.gov |
Not vulnerable. This flaw was first introduced in gdm version 2.14. Therefore these issues did not affect the earlier versions of gdm as shipped with Red Hat Enterprise Linux 2.1, 3, or 4. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.