GHSA-xgj6-pgrm-x4r2

Suggest an improvement
Source
https://github.com/advisories/GHSA-xgj6-pgrm-x4r2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-xgj6-pgrm-x4r2/GHSA-xgj6-pgrm-x4r2.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-xgj6-pgrm-x4r2
Aliases
Published
2017-10-24T18:33:38Z
Modified
2023-11-08T03:56:49.291314Z
Summary
gtk2 vulnerable to Use of Externally-Controlled Format String
Details

Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter.

Database specific
{
    "nvd_published_at": "2007-11-30T00:46:00Z",
    "cwe_ids": [
        "CWE-134"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T22:03:18Z"
}
References

Affected packages

RubyGems / gtk2

Package

Name
gtk2
Purl
pkg:gem/gtk2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.17.0