7.8
CVSSv2

CVE-2005-2975

Published: 18/11/2005 Updated: 11/08/2023
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

io-xpm.c in the gdk-pixbuf XPM image rendering library in GTK+ prior to 2.8.7 allows malicious users to cause a denial of service (infinite loop) via a crafted XPM image with a large number of colors.

Vulnerable Product Search on Vulmon Subscribe to Product

gnome gdkpixbuf

gnome gtk

Vendor Advisories

Debian Bug report logs - #339431 CVE-2005-3186: Integer overflow in gdk-pixbuf's XPM code Package: gtk+20; Maintainer for gtk+20 is Debian GNOME Maintainers <pkg-gnome-maintainers@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Wed, 16 Nov 2005 09:18:09 UTC Severity: grave Tags: fix ...
Two integer overflows have been discovered in the XPM image loader of the GDK pixbuf library By tricking an user into opening a specially crafted XPM image with any Gnome desktop application that uses this library, this could be exploited to execute arbitrary code with the privileges of the user running the application (CVE-2005-2976, CVE-2005-31 ...
Synopsis gdk-pixbuf security update Type/Severity Security Advisory: Important Topic Updated gdk-pixbuf packages that fix several security issues are now availableThis update has been rated as having important security impact by the RedHat Security Response Team Description The gdk-pixbuf ...
Synopsis gtk2 security update Type/Severity Security Advisory: Important Topic Updated gtk2 packages that fix two security issues are now availableThis update has been rated as having important security impact by the RedHat Security Response Team Description The gtk2 package contains the ...
Several vulnerabilities have been found in gtk+20, the Gtk+ GdkPixBuf XPM image rendering library The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2005-2975 Ludwig Nussel discovered an infinite loop when processing XPM images that allows an attacker to cause a denial of service via a specially c ...