First published: Fri Sep 17 2004(Updated: )
Stack-based buffer overflow in xpm_extract_color (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, may allow remote attackers to execute arbitrary code via a certain color string. NOTE: this identifier is ONLY for gtk+. It was incorrectly referenced in an advisory for a different issue (CVE-2004-0688).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME GdkPixbuf | =0.17 | |
GNOME GdkPixbuf | =0.18 | |
GNOME GdkPixbuf | =0.20 | |
GNOME GdkPixbuf | =0.22 | |
Gnome Gtk | =2.0.2 | |
Gnome Gtk | =2.0.6 | |
Gnome Gtk | =2.2.1 | |
Gnome Gtk | =2.2.3 | |
Gnome Gtk | =2.2.4 | |
Gtk Gtk\+ | =2.2.3 | |
Gtk Gtk\+ | =2.0.2 | |
Gtk Gtk\+ | =2.2.4 | |
Gtk Gtk\+ | =2.0.6 | |
Gtk Gtk\+ | =2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.