First published: Mon Aug 18 2008(Updated: )
Format string vulnerability in the window_error function in yelp-window.c in yelp in Gnome after 2.19.90 and before 2.24 allows remote attackers to execute arbitrary code via format string specifiers in an invalid URI on the command line, as demonstrated by use of yelp within (1) man or (2) ghelp URI handlers in Firefox, Evolution, and unspecified other programs.
Credit: security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gnome Yelp | ||
GNOME | =2.20 | |
GNOME | =2.22 | |
Gnome Yelp | <2.24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3533 has a high severity rating due to its potential to allow remote code execution.
To fix CVE-2008-3533, upgrade to versions of Yelp that are 2.24 or later.
CVE-2008-3533 affects Gnome Yelp versions from 2.19.90 to 2.24.
Yes, CVE-2008-3533 can be exploited remotely via specially crafted URIs.
CVE-2008-3533 is a format string vulnerability that can lead to arbitrary code execution.