CVE Vulnerabilities

CVE-2007-6183

Use of Externally-Controlled Format String

Published: Nov 30, 2007 | Modified: Apr 09, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
Ruby_gnome2Ruby_gnome20.16.0 (including)0.16.0 (including)
Ruby-gnome2Ubuntudapper*
Ruby-gnome2Ubuntuedgy*
Ruby-gnome2Ubuntufeisty*
Ruby-gnome2Ubuntugutsy*
Ruby-gnome2Ubuntuupstream*

Potential Mitigations

References