CVE-2005-3186

Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow.
References
Link Resource
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.8/SCOSA-2006.8.txt
http://secunia.com/advisories/17522
http://secunia.com/advisories/17538
http://secunia.com/advisories/17562
http://secunia.com/advisories/17588
http://secunia.com/advisories/17591
http://secunia.com/advisories/17592
http://secunia.com/advisories/17594
http://secunia.com/advisories/17615
http://secunia.com/advisories/17657
http://secunia.com/advisories/17710
http://secunia.com/advisories/17770
http://secunia.com/advisories/17791
http://secunia.com/advisories/18509
http://securityreason.com/securityalert/188
http://securitytracker.com/id?1015216
http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf
http://www.debian.org/security/2005/dsa-911
http://www.debian.org/security/2005/dsa-913
http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml
http://www.idefense.com/application/poi/display?id=339&type=vulnerabilities Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
http://www.novell.com/linux/security/advisories/2005_65_gtk2.html
http://www.redhat.com/support/errata/RHSA-2005-810.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-811.html
http://www.securityfocus.com/archive/1/428052/100/0/threaded
http://www.securityfocus.com/bid/15435
http://www.ubuntu.com/usn/usn-216-1
http://www.vupen.com/english/advisories/2005/2433
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9503
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.8/SCOSA-2006.8.txt
http://secunia.com/advisories/17522
http://secunia.com/advisories/17538
http://secunia.com/advisories/17562
http://secunia.com/advisories/17588
http://secunia.com/advisories/17591
http://secunia.com/advisories/17592
http://secunia.com/advisories/17594
http://secunia.com/advisories/17615
http://secunia.com/advisories/17657
http://secunia.com/advisories/17710
http://secunia.com/advisories/17770
http://secunia.com/advisories/17791
http://secunia.com/advisories/18509
http://securityreason.com/securityalert/188
http://securitytracker.com/id?1015216
http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf
http://www.debian.org/security/2005/dsa-911
http://www.debian.org/security/2005/dsa-913
http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml
http://www.idefense.com/application/poi/display?id=339&type=vulnerabilities Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
http://www.novell.com/linux/security/advisories/2005_65_gtk2.html
http://www.redhat.com/support/errata/RHSA-2005-810.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-811.html
http://www.securityfocus.com/archive/1/428052/100/0/threaded
http://www.securityfocus.com/bid/15435
http://www.ubuntu.com/usn/usn-216-1
http://www.vupen.com/english/advisories/2005/2433
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9503
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*
cpe:2.3:a:gtk:gtk\+:2.4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:01

Type Values Removed Values Added
References () ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.8/SCOSA-2006.8.txt - () ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.8/SCOSA-2006.8.txt -
References () http://secunia.com/advisories/17522 - () http://secunia.com/advisories/17522 -
References () http://secunia.com/advisories/17538 - () http://secunia.com/advisories/17538 -
References () http://secunia.com/advisories/17562 - () http://secunia.com/advisories/17562 -
References () http://secunia.com/advisories/17588 - () http://secunia.com/advisories/17588 -
References () http://secunia.com/advisories/17591 - () http://secunia.com/advisories/17591 -
References () http://secunia.com/advisories/17592 - () http://secunia.com/advisories/17592 -
References () http://secunia.com/advisories/17594 - () http://secunia.com/advisories/17594 -
References () http://secunia.com/advisories/17615 - () http://secunia.com/advisories/17615 -
References () http://secunia.com/advisories/17657 - () http://secunia.com/advisories/17657 -
References () http://secunia.com/advisories/17710 - () http://secunia.com/advisories/17710 -
References () http://secunia.com/advisories/17770 - () http://secunia.com/advisories/17770 -
References () http://secunia.com/advisories/17791 - () http://secunia.com/advisories/17791 -
References () http://secunia.com/advisories/18509 - () http://secunia.com/advisories/18509 -
References () http://securityreason.com/securityalert/188 - () http://securityreason.com/securityalert/188 -
References () http://securitytracker.com/id?1015216 - () http://securitytracker.com/id?1015216 -
References () http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf - () http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf -
References () http://www.debian.org/security/2005/dsa-911 - () http://www.debian.org/security/2005/dsa-911 -
References () http://www.debian.org/security/2005/dsa-913 - () http://www.debian.org/security/2005/dsa-913 -
References () http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml - () http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml -
References () http://www.idefense.com/application/poi/display?id=339&type=vulnerabilities - Patch, Vendor Advisory () http://www.idefense.com/application/poi/display?id=339&type=vulnerabilities - Patch, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:214 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:214 -
References () http://www.novell.com/linux/security/advisories/2005_65_gtk2.html - () http://www.novell.com/linux/security/advisories/2005_65_gtk2.html -
References () http://www.redhat.com/support/errata/RHSA-2005-810.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-810.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2005-811.html - () http://www.redhat.com/support/errata/RHSA-2005-811.html -
References () http://www.securityfocus.com/archive/1/428052/100/0/threaded - () http://www.securityfocus.com/archive/1/428052/100/0/threaded -
References () http://www.securityfocus.com/bid/15435 - () http://www.securityfocus.com/bid/15435 -
References () http://www.ubuntu.com/usn/usn-216-1 - () http://www.ubuntu.com/usn/usn-216-1 -
References () http://www.vupen.com/english/advisories/2005/2433 - () http://www.vupen.com/english/advisories/2005/2433 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9503 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9503 -

Information

Published : 2005-11-18 06:03

Updated : 2024-11-21 00:01


NVD link : CVE-2005-3186

Mitre link : CVE-2005-3186

CVE.ORG link : CVE-2005-3186


JSON object : View

Products Affected

gnome

  • gdkpixbuf

gtk

  • gtk\+