10
CVSSv2

CVE-2008-3533

Published: 18/08/2008 Updated: 08/08/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Format string vulnerability in the window_error function in yelp-window.c in yelp in Gnome after 2.19.90 and prior to 2.24 allows remote malicious users to execute arbitrary code via format string specifiers in an invalid URI on the command line, as demonstrated by use of yelp within (1) man or (2) ghelp URI handlers in Firefox, Evolution, and unspecified other programs.

Vulnerable Product Search on Vulmon Subscribe to Product

gnome yelp

gnome gnome 2.20

gnome gnome 2.22

Vendor Advisories

Aaron Grattafiori discovered that the Gnome Help Viewer did not handle format strings correctly when displaying certain error messages If a user were tricked into opening a specially crafted URI, a remote attacker could execute arbitrary code with user privileges ...

Exploits

source: wwwsecurityfocuscom/bid/30690/info Yelp is prone to a remote format-string vulnerability because the application fails to properly sanitize user-supplied input before including it in the format-specifier argument of a formatted-printing function A remote attacker may exploit this issue to execute arbitrary code with the privileg ...