Описание
Format string vulnerability in the permitted function of GNOME libgtop_daemon in libgtop 1.0.12 and earlier allows remote attackers to execute arbitrary code via an argument that contains format specifiers that are passed into the (1) syslog_message and (2) syslog_io_message functions.
Ссылки
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:gnome:libgtop_daemon:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnome:libgtop_daemon:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:gnome:libgtop_daemon:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:gnome:libgtop_daemon:1.0.12:*:*:*:*:*:*:*
EPSS
Процентиль: 84%
0.02051
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Format string vulnerability in the permitted function of GNOME libgtop_daemon in libgtop 1.0.12 and earlier allows remote attackers to execute arbitrary code via an argument that contains format specifiers that are passed into the (1) syslog_message and (2) syslog_io_message functions.
EPSS
Процентиль: 84%
0.02051
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other