ID CVE-2004-0782
Summary Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, allows remote attackers to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overflow. NOTE: this identifier is ONLY for gtk+. It was incorrectly referenced in an advisory for a different issue (CVE-2004-0687).
References
Vulnerable Configurations
  • cpe:2.3:a:gnome:gdkpixbuf:0.17:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdkpixbuf:0.17:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdkpixbuf:0.18:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdkpixbuf:0.18:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdkpixbuf:0.20:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdkpixbuf:0.20:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*
  • cpe:2.3:a:gtk:gtk\+:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:gtk:gtk\+:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gtk:gtk\+:2.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:gtk:gtk\+:2.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gtk:gtk\+:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:gtk:gtk\+:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gtk:gtk\+:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:gtk:gtk\+:2.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gtk:gtk\+:2.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:gtk:gtk\+:2.2.4:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 19-10-2018 - 15:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
oval via4
  • accepted 2013-04-29T04:14:37.937-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    description ent issue (CVE-2004-0687).
    family unix
    id oval:org.mitre.oval:def:11539
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, allows remote attackers to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overflow. NOTE: this identifier is ONLY for gtk+. It was incorrectly referenced in an advisory for a different issue (CVE-2004-0687).
    version 24
  • accepted 2011-05-09T04:01:16.284-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Shane Shaffer
      organization G2, Inc.
    description Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, allows remote attackers to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overflow. NOTE: this identifier is ONLY for gtk+. It was incorrectly referenced in an advisory for a different issue (CVE-2004-0687).
    family unix
    id oval:org.mitre.oval:def:1617
    status accepted
    submitted 2006-03-21T04:03:00.000-04:00
    title XPM Image Decoder Buffer Overflow
    version 34
redhat via4
advisories
  • rhsa
    id RHSA-2004:447
  • rhsa
    id RHSA-2004:466
refmap via4
bid 11195
bugtraq 20040915 CESA-2004-005: gtk+ XPM decoder
cert-vn VU#729894
conectiva CLA-2004:875
debian DSA-546
fedora
  • FLSA-2005:155510
  • FLSA:2005
mandrake MDKSA-2004:095
mandriva MDKSA-2005:214
misc http://scary.beasts.org/security/CESA-2004-005.txt
secunia 17657
sunalert 101776
xf gtk-xpm-pixbufcreatefromxpm-bo(17386)
Last major update 19-10-2018 - 15:30
Published 20-10-2004 - 04:00
Back to Top