First published: Tue Sep 06 2011(Updated: )
Untrusted search path vulnerability in gdk/win32/gdkinput-win32.c in GTK+ before 2.21.8 allows local users to gain privileges via a Trojan horse Wintab32.dll file in the current working directory.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Gnome Gtk | <2.21.8 | |
Gtk Gtk\+ | =2.7.4 | |
Gtk Gtk\+ | =2.9.1 | |
Gtk Gtk\+ | =2.12.10 | |
Gtk Gtk\+ | =2.9.3 | |
Gtk Gtk\+ | =2.4.9 | |
Gtk Gtk\+ | =2.12.3 | |
Gtk Gtk\+ | =2.14.4 | |
Gtk Gtk\+ | =2.19.6 | |
Gtk Gtk\+ | =1.2.1 | |
Gtk Gtk\+ | =2.8.9 | |
Gtk Gtk\+ | =2.16.2 | |
Gtk Gtk\+ | =1.2.6 | |
Gtk Gtk\+ | =1.3.9 | |
Gtk Gtk\+ | =2.14.7 | |
Gtk Gtk\+ | =2.8.20 | |
Gtk Gtk\+ | =2.16.1 | |
Gtk Gtk\+ | =1.2.9 | |
Gtk Gtk\+ | =2.2.3 | |
Gtk Gtk\+ | =2.4.7 | |
Gtk Gtk\+ | =2.0.2 | |
Gtk Gtk\+ | =2.18.0 | |
Gtk Gtk\+ | =2.15.4 | |
Gtk Gtk\+ | =2.14.1 | |
Gtk Gtk\+ | =2.17.4 | |
Gtk Gtk\+ | =2.21.1 | |
Gtk Gtk\+ | =2.17.5 | |
Gtk Gtk\+ | =2.7.3 | |
Gtk Gtk\+ | =1.2.10 | |
Gtk Gtk\+ | =2.17.1 | |
Gtk Gtk\+ | =1.2.2 | |
Gtk Gtk\+ | =2.19.5 | |
Gtk Gtk\+ | =2.5.3 | |
Gtk Gtk\+ | =1.2.4 | |
Gtk Gtk\+ | =2.5.0 | |
Gtk Gtk\+ | =2.10.0 | |
Gtk Gtk\+ | =2.0.8 | |
Gtk Gtk\+ | =2.4.2 | |
Gtk Gtk\+ | =2.4.3 | |
Gtk Gtk\+ | =2.14.3 | |
Gtk Gtk\+ | =2.10.11 | |
Gtk Gtk\+ | =2.15.2 | |
Gtk Gtk\+ | =2.11.3 | |
Gtk Gtk\+ | =2.8.7 | |
Gtk Gtk\+ | =2.10.3 | |
Gtk Gtk\+ | =2.7.5 | |
Gtk Gtk\+ | =2.11.5 | |
Gtk Gtk\+ | =2.8.5 | |
Gtk Gtk\+ | =2.9.2 | |
Gtk Gtk\+ | =2.21.6 | |
Gtk Gtk\+ | =2.18.3 | |
Gtk Gtk\+ | =2.17.0 | |
Gtk Gtk\+ | =2.12.2 | |
Gtk Gtk\+ | =2.6.9 | |
Gtk Gtk\+ | =2.17.2 | |
Gtk Gtk\+ | =2.13.1 | |
Gtk Gtk\+ | =1.3.12 | |
Gtk Gtk\+ | =1.2.7 | |
Gtk Gtk\+ | =2.2.0 | |
Gtk Gtk\+ | =2.8.11 | |
Gtk Gtk\+ | =1.2.8 | |
Gtk Gtk\+ | =2.18.8 | |
Gtk Gtk\+ | =2.6.8 | |
Gtk Gtk\+ | =2.10.13 | |
Gtk Gtk\+ | =2.6.6 | |
Gtk Gtk\+ | =2.3.2 | |
Gtk Gtk\+ | =2.8.15 | |
Gtk Gtk\+ | =2.18.6 | |
Gtk Gtk\+ | =2.5.5 | |
Gtk Gtk\+ | =2.21.3 | |
Gtk Gtk\+ | =2.6.5 | |
Gtk Gtk\+ | =2.10.4 | |
Gtk Gtk\+ | =2.12.1 | |
Gtk Gtk\+ | =2.10.9 | |
Gtk Gtk\+ | =2.8.14 | |
Gtk Gtk\+ | =2.1.3 | |
Gtk Gtk\+ | =2.0.4 | |
Gtk Gtk\+ | =1.3.13 | |
Gtk Gtk\+ | =2.14.2 | |
Gtk Gtk\+ | =2.8.2 | |
Gtk Gtk\+ | =2.11.1 | |
Gtk Gtk\+ | =2.21.4 | |
Gtk Gtk\+ | =2.17.8 | |
Gtk Gtk\+ | =2.5.2 | |
Gtk Gtk\+ | =2.8.8 | |
Gtk Gtk\+ | =2.0.9 | |
Gtk Gtk\+ | =2.4.14 | |
Gtk Gtk\+ | =2.13.2 | |
Gtk Gtk\+ | =2.3.5 | |
Gtk Gtk\+ | =2.13.4 | |
Gtk Gtk\+ | =2.10.6 | |
Gtk Gtk\+ | =2.8.18 | |
Gtk Gtk\+ | =2.1.0 | |
Gtk Gtk\+ | =2.6.0 | |
Gtk Gtk\+ | =2.4.8 | |
Gtk Gtk\+ | =2.3.6 | |
Gtk Gtk\+ | =2.5.4 | |
Gtk Gtk\+ | =1.2.5 | |
Gtk Gtk\+ | =2.15.5 | |
Gtk Gtk\+ | =2.19.4 | |
Gtk Gtk\+ | =2.6.2 | |
Gtk Gtk\+ | =2.11.0 | |
Gtk Gtk\+ | =2.12.9 | |
Gtk Gtk\+ | =2.13.3 | |
Gtk Gtk\+ | <=2.21.7 | |
Gtk Gtk\+ | =2.6.3 | |
Gtk Gtk\+ | =2.18.2 | |
Gtk Gtk\+ | =2.12.6 | |
Gtk Gtk\+ | =2.17.7 | |
Gtk Gtk\+ | =2.4.11 | |
Gtk Gtk\+ | =2.6.10 | |
Gtk Gtk\+ | =2.8.17 | |
Gtk Gtk\+ | =2.16.6 | |
Gtk Gtk\+ | =2.19.7 | |
Gtk Gtk\+ | =2.10.10 | |
Gtk Gtk\+ | =2.12.0 | |
Gtk Gtk\+ | =2.15.1 | |
Gtk Gtk\+ | =2.7.0 | |
Gtk Gtk\+ | =2.8.0 | |
Gtk Gtk\+ | =2.18.7 | |
Gtk Gtk\+ | =2.10.14 | |
Gtk Gtk\+ | =2.4.0 | |
Gtk Gtk\+ | =2.18.1 | |
Gtk Gtk\+ | =1.3.10 | |
Gtk Gtk\+ | =2.12.4 | |
Gtk Gtk\+ | =2.14.6 | |
Gtk Gtk\+ | =2.21.0 | |
Gtk Gtk\+ | =2.8.12 | |
Gtk Gtk\+ | =2.21.2 | |
Gtk Gtk\+ | =1.1.15 | |
Gtk Gtk\+ | =2.9.0 | |
Gtk Gtk\+ | =2.13.5 | |
Gtk Gtk\+ | =2.19.2 | |
Gtk Gtk\+ | =2.1.4 | |
Gtk Gtk\+ | =2.13.6 | |
Gtk Gtk\+ | =2.3.0 | |
Gtk Gtk\+ | =2.2.4 | |
Gtk Gtk\+ | =2.4.1 | |
Gtk Gtk\+ | =2.10.8 | |
Gtk Gtk\+ | =2.20.0 | |
Gtk Gtk\+ | =2.16.5 | |
Gtk Gtk\+ | =2.4.6 | |
Gtk Gtk\+ | =2.11.2 | |
Gtk Gtk\+ | =2.4.4 | |
Gtk Gtk\+ | =2.5.6 | |
Gtk Gtk\+ | =1.3.15 | |
Gtk Gtk\+ | =2.10.2 | |
Gtk Gtk\+ | =2.16.0 | |
Gtk Gtk\+ | =2.0.1 | |
Gtk Gtk\+ | =2.0.3 | |
Gtk Gtk\+ | =2.8.3 | |
Gtk Gtk\+ | =2.0.7 | |
Gtk Gtk\+ | =2.10.5 | |
Gtk Gtk\+ | =2.1.1 | |
Gtk Gtk\+ | =2.8.6 | |
Gtk Gtk\+ | =1.1.12 | |
Gtk Gtk\+ | =2.15.0 | |
Gtk Gtk\+ | =2.17.3 | |
Gtk Gtk\+ | =2.17.10 | |
Gtk Gtk\+ | =2.4.5 | |
Gtk Gtk\+ | =2.8.19 | |
Gtk Gtk\+ | =2.20.1 | |
Gtk Gtk\+ | =2.0.6 | |
Gtk Gtk\+ | =2.12.8 | |
Gtk Gtk\+ | =1.3.11 | |
Gtk Gtk\+ | =1.2.3 | |
Gtk Gtk\+ | =2.12.5 | |
Gtk Gtk\+ | =2.10.1 | |
Gtk Gtk\+ | =2.17.11 | |
Gtk Gtk\+ | =1.3.14 | |
Gtk Gtk\+ | =1.2.0 | |
Gtk Gtk\+ | =2.3.1 | |
Gtk Gtk\+ | =2.11.4 | |
Gtk Gtk\+ | =2.2.1 | |
Gtk Gtk\+ | =2.12.12 | |
Gtk Gtk\+ | =2.9.4 | |
Gtk Gtk\+ | =2.11.6 | |
Gtk Gtk\+ | =2.18.9 | |
Gtk Gtk\+ | =2.16.3 | |
Gtk Gtk\+ | =2.12.11 | |
Gtk Gtk\+ | =2.10.12 | |
Gtk Gtk\+ | =2.2.2 | |
Gtk Gtk\+ | =2.14.0 | |
Gtk Gtk\+ | =2.6.7 | |
Gtk Gtk\+ | =2.3.4 | |
Gtk Gtk\+ | =2.3.3 | |
Gtk Gtk\+ | =2.6.4 | |
Gtk Gtk\+ | =2.7.2 | |
Gtk Gtk\+ | =2.5.1 | |
Gtk Gtk\+ | =2.15.3 | |
Gtk Gtk\+ | =2.1.2 | |
Gtk Gtk\+ | =2.17.6 | |
Gtk Gtk\+ | =2.10.7 | |
Gtk Gtk\+ | =2.8.1 | |
Gtk Gtk\+ | =2.12.7 | |
Gtk Gtk\+ | =2.4.13 | |
Gtk Gtk\+ | =2.8.10 | |
Gtk Gtk\+ | =2.8.4 | |
Gtk Gtk\+ | =2.18.4 | |
Gtk Gtk\+ | =2.21.5 | |
Gtk Gtk\+ | =2.13.7 | |
Gtk Gtk\+ | =2.19.0 | |
Gtk Gtk\+ | =2.8.16 | |
Gtk Gtk\+ | =2.16.4 | |
Gtk Gtk\+ | =2.0.0 | |
Gtk Gtk\+ | =2.13.0 | |
Gtk Gtk\+ | =2.7.1 | |
Gtk Gtk\+ | =2.17.9 | |
Gtk Gtk\+ | =2.19.3 | |
Gtk Gtk\+ | =2.14.5 | |
Gtk Gtk\+ | =2.8.13 | |
Gtk Gtk\+ | =2.4.10 | |
Gtk Gtk\+ | =2.18.5 | |
Gtk Gtk\+ | =2.4.12 | |
Gtk Gtk\+ | =2.0.5 | |
Gtk Gtk\+ | =2.1.5 | |
Gtk Gtk\+ | =2.6.1 | |
Gtk Gtk\+ | =2.19.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.