6.8
CVSSv2

CVE-2007-6183

Published: 30/11/2007 Updated: 15/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions prior to 20071127, allows context-dependent malicious users to execute arbitrary code via format string specifiers in the message parameter.

Vulnerable Product Search on Vulmon Subscribe to Product

ruby gnome2 ruby gnome2 0.16.0

Vendor Advisories

Debian Bug report logs - #453689 ruby-gnome2: CVE-2007-6183 format string vulnerability Package: ruby-gnome2; Maintainer for ruby-gnome2 is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Source for ruby-gnome2 is src:ruby-gnome2 (PTS, buildd, popcon) Reported by: Nico Golde <nion@deb ...
It was discovered that ruby-gnome2, the GNOME-related bindings for the Ruby language, didn't properly sanitize input prior to constructing dialogs This could allow the execution of arbitrary code if untrusted input is displayed within a dialog For the old stable distribution (sarge), this problem has been fixed in version 0120-2sarge1 For the ...