First published: Fri Sep 17 2004(Updated: )
Stack-based buffer overflow in xpm_extract_color (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, may allow remote attackers to execute arbitrary code via a certain color string. NOTE: this identifier is ONLY for gtk+. It was incorrectly referenced in an advisory for a different issue (CVE-2004-0688).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GdkPixbuf | =0.17 | |
GdkPixbuf | =0.18 | |
GdkPixbuf | =0.20 | |
GdkPixbuf | =0.22 | |
GTK | =2.0.2 | |
GTK | =2.0.6 | |
GTK | =2.2.1 | |
GTK | =2.2.3 | |
GTK | =2.2.4 | |
GTK+ | =2.2.3 | |
GTK+ | =2.0.2 | |
GTK+ | =2.2.4 | |
GTK+ | =2.0.6 | |
GTK+ | =2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0783 is classified as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2004-0783, upgrade to a patched version of GTK+ or gdk-pixbuf that addresses the buffer overflow issue.
CVE-2004-0783 affects GTK+ versions prior to 2.4.4 and gdk-pixbuf versions prior to 0.22.
Yes, CVE-2004-0783 can be exploited remotely through specially crafted color strings.
CVE-2004-0783 is a stack-based buffer overflow vulnerability.