Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1431-1 | New ruby-gnome2 packages fix execution of arbitrary code |
EUVD |
EUVD-2017-0330 | Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter. |
Github GHSA |
GHSA-xgj6-pgrm-x4r2 | gtk2 vulnerable to Use of Externally-Controlled Format String |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 28 May 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T15:54:27.054Z
Reserved: 2007-11-29T00:00:00
Link: CVE-2007-6183
No data.
Status : Deferred
Published: 2007-11-30T00:46:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-6183
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA