gtk2 vulnerable to Use of Externally-Controlled Format String
Moderate severity
GitHub Reviewed
Published
Oct 24, 2017
to the GitHub Advisory Database
•
Updated Nov 5, 2023
Description
Published by the National Vulnerability Database
Nov 30, 2007
Published to the GitHub Advisory Database
Oct 24, 2017
Reviewed
Jun 16, 2020
Last updated
Nov 5, 2023
Format string vulnerability in the
mdiag_initialize
function ingtk/src/rbgtkmessagedialog.c
in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter.References