Integer overflow in io-xpm.c in gdk-pixbuf 0.22.0 in GTK+ before 2.8.7 allows attackers to cause a denial of service (crash) or execute arbitrary code via an XPM file with large height, width, and colour values, a different vulnerability than CVE-2005-3186.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 7.5 | HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
CWE ID | Type | Source |
---|---|---|
CWE-190 | Primary | nvd@nist.gov |
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
Hyperlink | Source | Resource |
---|---|---|
http://secunia.com/advisories/17522 | secalert@redhat.com | Vendor Advisory |
http://secunia.com/advisories/17538 | secalert@redhat.com | Vendor Advisory |
http://secunia.com/advisories/17562 | secalert@redhat.com | Vendor Advisory |
http://secunia.com/advisories/17592 | secalert@redhat.com | Vendor Advisory |
http://secunia.com/advisories/17594 | secalert@redhat.com | Vendor Advisory |
http://secunia.com/advisories/17615 | secalert@redhat.com | Vendor Advisory |
http://secunia.com/advisories/17657 | secalert@redhat.com | Vendor Advisory |
http://secunia.com/advisories/17710 | secalert@redhat.com | Vendor Advisory |
http://secunia.com/advisories/17770 | secalert@redhat.com | Vendor Advisory |
http://secunia.com/advisories/17791 | secalert@redhat.com | Vendor Advisory |
http://securitytracker.com/id?1015216 | secalert@redhat.com | Third Party Advisory VDB Entry |
http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf | secalert@redhat.com | Third Party Advisory |
http://www.debian.org/security/2005/dsa-911 | secalert@redhat.com | Third Party Advisory |
http://www.debian.org/security/2005/dsa-913 | secalert@redhat.com | Third Party Advisory |
http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml | secalert@redhat.com | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDKSA-2005:214 | secalert@redhat.com | Broken Link Third Party Advisory |
http://www.novell.com/linux/security/advisories/2005_65_gtk2.html | secalert@redhat.com | Third Party Advisory |
http://www.redhat.com/support/errata/RHSA-2005-810.html | secalert@redhat.com | Patch Vendor Advisory |
http://www.securityfocus.com/archive/1/428052/100/0/threaded | secalert@redhat.com | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/15428 | secalert@redhat.com | Broken Link Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/usn-216-1 | secalert@redhat.com | Third Party Advisory |
http://www.vupen.com/english/advisories/2005/2433 | secalert@redhat.com | Broken Link Vendor Advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11370 | secalert@redhat.com | Broken Link |
http://secunia.com/advisories/17522 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
http://secunia.com/advisories/17538 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
http://secunia.com/advisories/17562 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
http://secunia.com/advisories/17592 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
http://secunia.com/advisories/17594 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
http://secunia.com/advisories/17615 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
http://secunia.com/advisories/17657 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
http://secunia.com/advisories/17710 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
http://secunia.com/advisories/17770 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
http://secunia.com/advisories/17791 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
http://securitytracker.com/id?1015216 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.debian.org/security/2005/dsa-911 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.debian.org/security/2005/dsa-913 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDKSA-2005:214 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link Third Party Advisory |
http://www.novell.com/linux/security/advisories/2005_65_gtk2.html | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.redhat.com/support/errata/RHSA-2005-810.html | af854a3a-2127-422b-91ae-364da2661108 | Patch Vendor Advisory |
http://www.securityfocus.com/archive/1/428052/100/0/threaded | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/15428 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/usn-216-1 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.vupen.com/english/advisories/2005/2433 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link Vendor Advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11370 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link |