CVE-2004-0782

Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, allows remote attackers to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overflow. NOTE: this identifier is ONLY for gtk+. It was incorrectly referenced in an advisory for a different issue (CVE-2004-0687).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnome:gdkpixbuf:0.17:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdkpixbuf:0.18:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdkpixbuf:0.20:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.2.4:*:*:*:*:*:*:*

History

11 Aug 2023, 20:18

Type Values Removed Values Added
References (DEBIAN) http://www.debian.org/security/2004/dsa-546 - (DEBIAN) http://www.debian.org/security/2004/dsa-546 - Third Party Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/17386 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/17386 - Third Party Advisory, VDB Entry
References (MANDRAKE) http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095 - (MANDRAKE) http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095 - Third Party Advisory
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=109528994916275&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=109528994916275&w=2 - Third Party Advisory
References (FEDORA) http://www.securityfocus.com/archive/1/419771/100/0/threaded - (FEDORA) http://www.securityfocus.com/archive/1/419771/100/0/threaded - Third Party Advisory, VDB Entry
References (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-101776-1 - (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-101776-1 - Third Party Advisory
References (FEDORA) https://bugzilla.fedora.us/show_bug.cgi?id=2005 - (FEDORA) https://bugzilla.fedora.us/show_bug.cgi?id=2005 - Issue Tracking
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2005:214 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2005:214 - Broken Link
References (CERT-VN) http://www.kb.cert.org/vuls/id/729894 - US Government Resource (CERT-VN) http://www.kb.cert.org/vuls/id/729894 - Third Party Advisory, US Government Resource
References (BID) http://www.securityfocus.com/bid/11195 - (BID) http://www.securityfocus.com/bid/11195 - Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/17657 - (SECUNIA) http://secunia.com/advisories/17657 - Broken Link
References (CONECTIVA) http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000875 - (CONECTIVA) http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000875 - Third Party Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1617 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1617 - Broken Link
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11539 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11539 - Broken Link
References (MISC) http://scary.beasts.org/security/CESA-2004-005.txt - (MISC) http://scary.beasts.org/security/CESA-2004-005.txt - Third Party Advisory
CPE cpe:2.3:a:gtk:gtk\+:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gtk:gtk\+:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gtk:gtk\+:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gtk:gtk\+:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gtk:gtk\+:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gtk:2.2.4:*:*:*:*:*:*:*
First Time Gnome gtk

Information

Published : 2004-10-20 04:00

Updated : 2023-12-10 10:17


NVD link : CVE-2004-0782

Mitre link : CVE-2004-0782

CVE.ORG link : CVE-2004-0782


JSON object : View

Products Affected

gnome

  • gdkpixbuf
  • gtk