3.7
CVSSv2

CVE-2007-0235

Published: 16/01/2007 Updated: 11/10/2017
CVSS v2 Base Score: 3.7 | Impact Score: 6.4 | Exploitability Score: 1.9
VMScore: 375
Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the glibtop_get_proc_map_s function in libgtop prior to 2.14.6 (libgtop2) allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a process with a long filename that is mapped in its address space, which triggers the overflow in gnome-system-monitor.

Vulnerable Product Search on Vulmon Subscribe to Product

libgtop libgtop

Vendor Advisories

Liu Qishuai discovered that the GNOME gtop library performs insufficient sanitising when parsing the system's /proc table, which may lead to the execution of arbitrary code For the stable distribution (sarge) this problem has been fixed in version 260-4sarge1 For the upcoming stable distribution (etch) this problem has been fixed in version 21 ...

Exploits

source: wwwsecurityfocuscom/bid/22054/info The 'libgtop2' library is prone to a local buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying into an insufficiently sized memory buffer An attacker may exploit this issue by enticing victims into viewing a maliciously crafted system proce ...