Format string vulnerability in the window_error function in yelp-window.c in yelp in Gnome after 2.19.90 and before 2.24 allows remote attackers to execute arbitrary code via format string specifiers in an invalid URI on the command line, as demonstrated by use of yelp within (1) man or (2) ghelp URI handlers in Firefox, Evolution, and unspecified other programs.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-638-1 | Yelp vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 28 May 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-08-07T09:45:18.106Z
Reserved: 2008-08-07T00:00:00
Link: CVE-2008-3533
No data.
Status : Deferred
Published: 2008-08-18T17:41:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-3533
OpenCVE Enrichment
No data.
Ubuntu USN