5.1
CVSSv2

CVE-2005-3737

Published: 22/11/2005 Updated: 08/03/2011
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 515
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the SVG importer (style.cpp) of inkscape 0.41 up to and including 0.42.2 might allow remote malicious users to execute arbitrary code via a SVG file with long CSS style property values.

Vulnerable Product Search on Vulmon Subscribe to Product

inkscape inkscape 0.42.2

inkscape inkscape 0.41

inkscape inkscape 0.42

inkscape inkscape 0.42.1

Vendor Advisories

Debian Bug report logs - #330894 inkscape: Arbitrary code execution when opening a malicious file Package: inkscape; Maintainer for inkscape is Debian Multimedia Maintainers <debian-multimedia@listsdebianorg>; Source for inkscape is src:inkscape (PTS, buildd, popcon) Reported by: Joxean Koret <joxeankoret@yahooes> ...
Several vulnerabilities have been discovered in Inkscape, a vector-based drawing program The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2005-3737 Joxean Koret discovered a buffer overflow in the SVG parsing routines that can lead to the execution of arbitrary code CVE-2005-3885 Javier Fernánd ...

Exploits

source: wwwsecurityfocuscom/bid/15507/info Inkscape is prone to a buffer overflow vulnerability This issue is due to a failure in the application to do proper bounds checking on user-supplied data before copying it into a finite sized buffer When the application processes a malformed SVG image file, it results in a buffer overflow An ...