ID CVE-2005-1686
Summary Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename. NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.
References
Vulnerable Configurations
  • cpe:2.3:a:gnome:gedit:2.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gedit:2.10.2:*:*:*:*:*:*:*
CVSS
Base: 2.6 (as of 03-10-2018 - 21:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:N/I:N/A:P
oval via4
  • accepted 2007-02-20T13:39:37.408-05:00
    class vulnerability
    contributors
    • name Jay Beale
      organization Bastille Linux
    • name Bob Towbes
      organization Independent Contributor
    description Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename. NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.
    family unix
    id oval:org.mitre.oval:def:1245
    status accepted
    submitted 2005-07-11T12:00:00.000-04:00
    title gedit Format String Vulnerability
    version 5
  • accepted 2013-04-29T04:22:43.772-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    description Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename. NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.
    family unix
    id oval:org.mitre.oval:def:9845
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename. NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.
    version 29
redhat via4
advisories
rhsa
id RHSA-2005:499
rpms
  • gedit-1:2.2.2-4.rhel3
  • gedit-1:2.8.1-4
  • gedit-debuginfo-1:2.2.2-4.rhel3
  • gedit-debuginfo-1:2.8.1-4
  • gedit-devel-1:2.8.1-4
refmap via4
bugtraq 20050520 pst.advisory: gedit fun. opensource is god .lol windows
debian DSA-753
gentoo GLSA-200506-09
suse SUSE-SA:2005:036
ubuntu USN-138-1
Last major update 03-10-2018 - 21:30
Published 20-05-2005 - 04:00
Last modified 03-10-2018 - 21:30
Back to Top