First published: Fri Nov 18 2005(Updated: )
Integer overflow in io-xpm.c in gdk-pixbuf 0.22.0 in GTK+ before 2.8.7 allows attackers to cause a denial of service (crash) or execute arbitrary code via an XPM file with large height, width, and colour values, a different vulnerability than CVE-2005-3186.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME GdkPixbuf | =0.22 | |
Gnome Gtk | <2.8.7 | |
Gtk Gtk\+ | =2.7.4 | |
Gtk Gtk\+ | =2.4.9 | |
Gtk Gtk\+ | =1.2.1 | |
Gtk Gtk\+ | =1.2.6 | |
Gtk Gtk\+ | =1.3.9 | |
Gtk Gtk\+ | =1.2.9 | |
Gtk Gtk\+ | =2.2.3 | |
Gtk Gtk\+ | =2.4.7 | |
Gtk Gtk\+ | =2.7.3 | |
Gtk Gtk\+ | =1.2.10 | |
Gtk Gtk\+ | =1.2.2 | |
Gtk Gtk\+ | =2.5.3 | |
Gtk Gtk\+ | =1.2.4 | |
Gtk Gtk\+ | =2.5.0 | |
Gtk Gtk\+ | =2.4.2 | |
Gtk Gtk\+ | =2.4.3 | |
Gtk Gtk\+ | =2.7.5 | |
Gtk Gtk\+ | =2.8.5 | |
Gtk Gtk\+ | =2.6.9 | |
Gtk Gtk\+ | =1.3.12 | |
Gtk Gtk\+ | =1.2.7 | |
Gtk Gtk\+ | =2.2.0 | |
Gtk Gtk\+ | =1.2.8 | |
Gtk Gtk\+ | =2.6.8 | |
Gtk Gtk\+ | =2.6.6 | |
Gtk Gtk\+ | =2.3.2 | |
Gtk Gtk\+ | =2.5.5 | |
Gtk Gtk\+ | =2.6.5 | |
Gtk Gtk\+ | =2.1.3 | |
Gtk Gtk\+ | =1.3.13 | |
Gtk Gtk\+ | =2.8.2 | |
Gtk Gtk\+ | =2.5.2 | |
Gtk Gtk\+ | =2.4.14 | |
Gtk Gtk\+ | =2.3.5 | |
Gtk Gtk\+ | =2.1.0 | |
Gtk Gtk\+ | =2.6.0 | |
Gtk Gtk\+ | =2.4.8 | |
Gtk Gtk\+ | =2.3.6 | |
Gtk Gtk\+ | =2.5.4 | |
Gtk Gtk\+ | =1.2.5 | |
Gtk Gtk\+ | =2.6.2 | |
Gtk Gtk\+ | =2.6.3 | |
Gtk Gtk\+ | =2.4.11 | |
Gtk Gtk\+ | =2.6.10 | |
Gtk Gtk\+ | =2.7.0 | |
Gtk Gtk\+ | =2.8.0 | |
Gtk Gtk\+ | =2.4.0 | |
Gtk Gtk\+ | =1.3.10 | |
Gtk Gtk\+ | =1.1.15 | |
Gtk Gtk\+ | =2.1.4 | |
Gtk Gtk\+ | =2.3.0 | |
Gtk Gtk\+ | =2.2.4 | |
Gtk Gtk\+ | =2.4.1 | |
Gtk Gtk\+ | =2.4.6 | |
Gtk Gtk\+ | =2.4.4 | |
Gtk Gtk\+ | =2.5.6 | |
Gtk Gtk\+ | =1.3.15 | |
Gtk Gtk\+ | =2.8.3 | |
Gtk Gtk\+ | =2.1.1 | |
Gtk Gtk\+ | =1.1.12 | |
Gtk Gtk\+ | =2.4.5 | |
Gtk Gtk\+ | =1.3.11 | |
Gtk Gtk\+ | =1.2.3 | |
Gtk Gtk\+ | <=2.8.6 | |
Gtk Gtk\+ | =1.3.14 | |
Gtk Gtk\+ | =1.2.0 | |
Gtk Gtk\+ | =2.3.1 | |
Gtk Gtk\+ | =2.2.1 | |
Gtk Gtk\+ | =2.2.2 | |
Gtk Gtk\+ | =2.6.7 | |
Gtk Gtk\+ | =2.3.4 | |
Gtk Gtk\+ | =2.3.3 | |
Gtk Gtk\+ | =2.6.4 | |
Gtk Gtk\+ | =2.7.2 | |
Gtk Gtk\+ | =2.5.1 | |
Gtk Gtk\+ | =2.1.2 | |
Gtk Gtk\+ | =2.8.1 | |
Gtk Gtk\+ | =2.4.13 | |
Gtk Gtk\+ | =2.8.4 | |
Gtk Gtk\+ | =2.7.1 | |
Gtk Gtk\+ | =2.4.10 | |
Gtk Gtk\+ | =2.4.12 | |
Gtk Gtk\+ | =2.1.5 | |
Gtk Gtk\+ | =2.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.