Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-1686

Опубликовано: 20 мая 2005
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 2.6

Описание

Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename. NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.

РелизСтатусПримечание
dapper

released

2.14.2-0ubuntu3
devel

released

2.14.2-0ubuntu3
edgy

released

2.14.2-0ubuntu3
feisty

released

2.14.2-0ubuntu3
upstream

needs-triage

Показывать по

EPSS

Процентиль: 84%
0.02383
Низкий

2.6 Low

CVSS2

Связанные уязвимости

redhat
около 20 лет назад

Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename. NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.

nvd
около 20 лет назад

Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename. NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.

debian
около 20 лет назад

Format string vulnerability in gedit 2.10.2 may allow attackers to cau ...

github
больше 3 лет назад

Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename. NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.

fstec
больше 10 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации

EPSS

Процентиль: 84%
0.02383
Низкий

2.6 Low

CVSS2