Lucene search

K
ubuntuUbuntuUSN-138-1
HistoryJun 09, 2005 - 12:00 a.m.

gedit vulnerability

2005-06-0900:00:00
ubuntu.com
32

7.1 High

AI Score

Confidence

Low

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:N/I:N/A:P

0.005 Low

EPSS

Percentile

77.3%

Releases

  • Ubuntu 5.04
  • Ubuntu 4.10

Details

A format string vulnerability has been discovered in gedit. Calling
the program with specially crafted file names caused a buffer
overflow, which could be exploited to execute arbitrary code with the
privileges of the gedit user.

This becomes security relevant if e. g. your web browser is configued
to open URLs in gedit. If you never open untrusted file names or URLs
in gedit, this flaw does not affect you.

OSVersionArchitecturePackageVersionFilename
Ubuntu5.04noarchgedit< *UNKNOWN
Ubuntu4.10noarchgedit< *UNKNOWN

7.1 High

AI Score

Confidence

Low

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:N/I:N/A:P

0.005 Low

EPSS

Percentile

77.3%