CVE-2004-0782

Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, allows remote attackers to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overflow. NOTE: this identifier is ONLY for gtk+. It was incorrectly referenced in an advisory for a different issue (CVE-2004-0687).
References
Link Resource
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000875 Third Party Advisory
http://marc.info/?l=bugtraq&m=109528994916275&w=2 Third Party Advisory
http://scary.beasts.org/security/CESA-2004-005.txt Third Party Advisory
http://secunia.com/advisories/17657 Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101776-1 Third Party Advisory
http://www.debian.org/security/2004/dsa-546 Third Party Advisory
http://www.kb.cert.org/vuls/id/729894 Third Party Advisory US Government Resource
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:214 Broken Link
http://www.redhat.com/support/errata/RHSA-2004-447.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2004-466.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/419771/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/11195 Third Party Advisory VDB Entry
https://bugzilla.fedora.us/show_bug.cgi?id=2005 Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/17386 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11539 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1617 Broken Link
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000875 Third Party Advisory
http://marc.info/?l=bugtraq&m=109528994916275&w=2 Third Party Advisory
http://scary.beasts.org/security/CESA-2004-005.txt Third Party Advisory
http://secunia.com/advisories/17657 Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101776-1 Third Party Advisory
http://www.debian.org/security/2004/dsa-546 Third Party Advisory
http://www.kb.cert.org/vuls/id/729894 Third Party Advisory US Government Resource
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:214 Broken Link
http://www.redhat.com/support/errata/RHSA-2004-447.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2004-466.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/419771/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/11195 Third Party Advisory VDB Entry
https://bugzilla.fedora.us/show_bug.cgi?id=2005 Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/17386 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11539 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1617 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnome:gdkpixbuf:0.17:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdkpixbuf:0.18:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdkpixbuf:0.20:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.2.4:*:*:*:*:*:*:*

History

20 Nov 2024, 23:49

Type Values Removed Values Added
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000875 - Third Party Advisory () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000875 - Third Party Advisory
References () http://marc.info/?l=bugtraq&m=109528994916275&w=2 - Third Party Advisory () http://marc.info/?l=bugtraq&m=109528994916275&w=2 - Third Party Advisory
References () http://scary.beasts.org/security/CESA-2004-005.txt - Third Party Advisory () http://scary.beasts.org/security/CESA-2004-005.txt - Third Party Advisory
References () http://secunia.com/advisories/17657 - Broken Link () http://secunia.com/advisories/17657 - Broken Link
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101776-1 - Third Party Advisory () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101776-1 - Third Party Advisory
References () http://www.debian.org/security/2004/dsa-546 - Third Party Advisory () http://www.debian.org/security/2004/dsa-546 - Third Party Advisory
References () http://www.kb.cert.org/vuls/id/729894 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/729894 - Third Party Advisory, US Government Resource
References () http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095 - Third Party Advisory () http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:214 - Broken Link () http://www.mandriva.com/security/advisories?name=MDKSA-2005:214 - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2004-447.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2004-447.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2004-466.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2004-466.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/419771/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/419771/100/0/threaded - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/11195 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/11195 - Third Party Advisory, VDB Entry
References () https://bugzilla.fedora.us/show_bug.cgi?id=2005 - Issue Tracking () https://bugzilla.fedora.us/show_bug.cgi?id=2005 - Issue Tracking
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17386 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/17386 - Third Party Advisory, VDB Entry
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11539 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11539 - Broken Link
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1617 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1617 - Broken Link

11 Aug 2023, 20:18

Type Values Removed Values Added
References (FEDORA) https://bugzilla.fedora.us/show_bug.cgi?id=2005 - (FEDORA) https://bugzilla.fedora.us/show_bug.cgi?id=2005 - Issue Tracking
References (CONECTIVA) http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000875 - (CONECTIVA) http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000875 - Third Party Advisory
References (CERT-VN) http://www.kb.cert.org/vuls/id/729894 - US Government Resource (CERT-VN) http://www.kb.cert.org/vuls/id/729894 - Third Party Advisory, US Government Resource
References (DEBIAN) http://www.debian.org/security/2004/dsa-546 - (DEBIAN) http://www.debian.org/security/2004/dsa-546 - Third Party Advisory
References (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-101776-1 - (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-101776-1 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/17657 - (SECUNIA) http://secunia.com/advisories/17657 - Broken Link
References (MISC) http://scary.beasts.org/security/CESA-2004-005.txt - (MISC) http://scary.beasts.org/security/CESA-2004-005.txt - Third Party Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1617 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1617 - Broken Link
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11539 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11539 - Broken Link
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=109528994916275&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=109528994916275&w=2 - Third Party Advisory
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2005:214 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2005:214 - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/17386 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/17386 - Third Party Advisory, VDB Entry
References (MANDRAKE) http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095 - (MANDRAKE) http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095 - Third Party Advisory
References (FEDORA) http://www.securityfocus.com/archive/1/419771/100/0/threaded - (FEDORA) http://www.securityfocus.com/archive/1/419771/100/0/threaded - Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/11195 - (BID) http://www.securityfocus.com/bid/11195 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:gtk:gtk\+:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:gtk:gtk\+:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gtk:gtk\+:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gtk:gtk\+:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gtk:gtk\+:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.2.1:*:*:*:*:*:*:*

Information

Published : 2004-10-20 04:00

Updated : 2024-11-20 23:49


NVD link : CVE-2004-0782

Mitre link : CVE-2004-0782

CVE.ORG link : CVE-2004-0782


JSON object : View

Products Affected

gnome

  • gtk
  • gdkpixbuf