7.5
CVSSv2

CVE-2005-3186

Published: 18/11/2005 Updated: 19/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows malicious users to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

gnome gdkpixbuf

gtk gtk\\+ 2.4.0

Vendor Advisories

Debian Bug report logs - #339431 CVE-2005-3186: Integer overflow in gdk-pixbuf's XPM code Package: gtk+20; Maintainer for gtk+20 is Debian GNOME Maintainers <pkg-gnome-maintainers@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Wed, 16 Nov 2005 09:18:09 UTC Severity: grave Tags: fix ...
Two integer overflows have been discovered in the XPM image loader of the GDK pixbuf library By tricking an user into opening a specially crafted XPM image with any Gnome desktop application that uses this library, this could be exploited to execute arbitrary code with the privileges of the user running the application (CVE-2005-2976, CVE-2005-31 ...
Synopsis gdk-pixbuf security update Type/Severity Security Advisory: Important Topic Updated gdk-pixbuf packages that fix several security issues are now availableThis update has been rated as having important security impact by the RedHat Security Response Team Description The gdk-pixbuf ...
Synopsis gtk2 security update Type/Severity Security Advisory: Important Topic Updated gtk2 packages that fix two security issues are now availableThis update has been rated as having important security impact by the RedHat Security Response Team Description The gtk2 package contains the ...
Several vulnerabilities have been found in gtk+20, the Gtk+ GdkPixBuf XPM image rendering library The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2005-2975 Ludwig Nussel discovered an infinite loop when processing XPM images that allows an attacker to cause a denial of service via a specially c ...

References

NVD-CWE-Otherhttp://www.idefense.com/application/poi/display?id=339&type=vulnerabilitieshttp://www.redhat.com/support/errata/RHSA-2005-810.htmlhttp://www.gentoo.org/security/en/glsa/glsa-200511-14.xmlhttp://www.novell.com/linux/security/advisories/2005_65_gtk2.htmlhttp://www.ubuntu.com/usn/usn-216-1http://securitytracker.com/id?1015216http://secunia.com/advisories/17522http://www.securityfocus.com/bid/15435http://www.debian.org/security/2005/dsa-913http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdfhttp://secunia.com/advisories/17594http://secunia.com/advisories/17710http://www.debian.org/security/2005/dsa-911http://www.redhat.com/support/errata/RHSA-2005-811.htmlhttp://secunia.com/advisories/17538http://secunia.com/advisories/17562http://secunia.com/advisories/17588http://secunia.com/advisories/17591http://secunia.com/advisories/17592http://secunia.com/advisories/17615http://secunia.com/advisories/17657http://secunia.com/advisories/17770http://secunia.com/advisories/17791ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.8/SCOSA-2006.8.txthttp://secunia.com/advisories/18509http://www.mandriva.com/security/advisories?name=MDKSA-2005:214http://securityreason.com/securityalert/188http://www.vupen.com/english/advisories/2005/2433https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9503http://www.securityfocus.com/archive/1/428052/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431https://usn.ubuntu.com/216-1/https://nvd.nist.gov