Description
Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1431-1 | New ruby-gnome2 packages fix execution of arbitrary code |
EUVD |
EUVD-2017-0330 | Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter. |
Github GHSA |
GHSA-xgj6-pgrm-x4r2 | gtk2 vulnerable to Use of Externally-Controlled Format String |
References
History
Wed, 28 May 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T15:54:27.054Z
Reserved: 2007-11-29T00:00:00.000Z
Link: CVE-2007-6183
No data.
Status : Deferred
Published: 2007-11-30T00:46:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-6183
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Github GHSA