Vulnerability Details : CVE-2005-1686
Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename. NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.
Vulnerability category: Denial of service
Products affected by CVE-2005-1686
- cpe:2.3:a:gnome:gedit:2.10.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-1686
0.54%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 77 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-1686
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.6
|
LOW | AV:N/AC:H/Au:N/C:N/I:N/A:P |
4.9
|
2.9
|
NIST |
References for CVE-2005-1686
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1245
404 Not Found
-
http://marc.info/?l=bugtraq&m=111661117701398&w=2
'pst.advisory: gedit fun. opensource is god .lol windows' - MARC
-
http://www.debian.org/security/2005/dsa-753
[SECURITY] [DSA 753-1] New gedit packages fix denial of service
-
https://usn.ubuntu.com/138-1/
404: Page not found | Ubuntu
-
http://www.redhat.com/support/errata/RHSA-2005-499.html
Support
-
http://security.gentoo.org/glsa/glsa-200506-09.xml
gedit: Format string vulnerability (GLSA 200506-09) — Gentoo security
-
http://www.novell.com/linux/security/advisories/2005_36_sudo.html
404 Page Not Found | SUSE
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9845
404 Not Found
Jump to