First published: Sat Mar 14 2009(Updated: )
Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME libraries | <=2.16.4 | |
GNOME libraries | =2.2.1 | |
GNOME libraries | =2.14.5 | |
GNOME libraries | =2.14.6 | |
GNOME libraries | =2.16.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4316 is classified as a high severity vulnerability due to its potential to allow attackers to execute arbitrary code.
To fix CVE-2008-4316, update GLib to version 2.20 or later, which addresses the integer overflow issue.
CVE-2008-4316 affects GLib versions prior to 2.20, including 2.14.5, 2.14.6, 2.16.3, and up to 2.16.4.
CVE-2008-4316 can be exploited by context-dependent attackers through long strings converted to or from base64 representations.
While CVE-2008-4316 primarily affects older versions of GLib, it can still pose a concern in legacy systems that have not been updated.