A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.
{
"binaries": [
{
"binary_version": "0.7-1ubuntu0.1",
"binary_name": "gcab"
},
{
"binary_version": "0.7-1ubuntu0.1",
"binary_name": "gir1.2-libgcab-1.0"
},
{
"binary_version": "0.7-1ubuntu0.1",
"binary_name": "libgcab-1.0-0"
},
{
"binary_version": "0.7-1ubuntu0.1",
"binary_name": "libgcab-dev"
}
],
"availability": "No subscription required"
}