First published: Sat Mar 14 2009(Updated: )
Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME GLib | =2.14.5 | |
GNOME GLib | <=2.16.4 | |
GNOME GLib | =2.16.3 | |
GNOME GLib | =2.14.6 | |
GNOME GLib | =2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.