First published: Fri Nov 18 2005(Updated: )
Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
gdk-pixbuf | ||
GTK+ | =2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3186 is classified as a high severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2005-3186, upgrade to a patched version of GTK+ or GdkPixbuf that addresses this integer overflow issue.
CVE-2005-3186 affects GTK+ version 2.4.0 and GdkPixbuf across various implementations.
CVE-2005-3186 is an integer overflow vulnerability that leads to a heap-based buffer overflow.
CVE-2005-3186 can allow attackers to execute arbitrary code on systems running affected versions of GTK+ or GdkPixbuf.