Vulnerability CVE-2008-3533


Published: 2008-08-18   Modified: 2012-02-12

Description:
Format string vulnerability in the window_error function in yelp-window.c in yelp in Gnome after 2.19.90 and before 2.24 allows remote attackers to execute arbitrary code via format string specifiers in an invalid URI on the command line, as demonstrated by use of yelp within (1) man or (2) ghelp URI handlers in Firefox, Evolution, and unspecified other programs.

Type:

CWE-134

(Uncontrolled Format String)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Gnome -> Gnome 
Gnome -> YELP 

 References:
https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860
http://bugzilla.gnome.org/show_bug.cgi?id=546364
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00222.html
http://xforce.iss.net/xforce/xfdb/44449
http://www.vupen.com/english/advisories/2008/2393
http://www.ubuntu.com/usn/usn-638-1
http://www.securityfocus.com/bid/30690
http://www.mandriva.com/security/advisories?name=MDVSA-2008:175
http://secunia.com/advisories/32629
http://secunia.com/advisories/31834
http://secunia.com/advisories/31620
http://secunia.com/advisories/31465
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html
http://bugzilla.gnome.org/attachment.cgi?id=115890

Copyright 2024, cxsecurity.com

 

Back to Top