First published: Wed Mar 21 2007(Updated: )
Format string vulnerability in Inkscape before 0.45.1 allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a URI, which is not properly handled by certain dialogs.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Linux | =5.10 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =6.06_lts | |
Ubuntu Linux | =6.10 | |
Inkscape | =0.40 | |
Inkscape | =0.41 | |
Inkscape | =0.42 | |
Inkscape | =0.42.1 | |
Inkscape | =0.42.2 | |
Inkscape | =0.43 | |
Inkscape | =0.44 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1463 is considered to be a medium severity vulnerability.
To mitigate CVE-2007-1463, upgrade Inkscape to version 0.45.1 or later.
CVE-2007-1463 affects Inkscape versions prior to 0.45.1.
Yes, CVE-2007-1463 allows user-assisted remote attackers to execute arbitrary code.
No, specific versions of Ubuntu Linux are not vulnerable to CVE-2007-1463.