Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ruby_gnome2 | Ruby_gnome2 | 0.16.0 (including) | 0.16.0 (including) |
Ruby-gnome2 | Ubuntu | dapper | * |
Ruby-gnome2 | Ubuntu | edgy | * |
Ruby-gnome2 | Ubuntu | feisty | * |
Ruby-gnome2 | Ubuntu | gutsy | * |
Ruby-gnome2 | Ubuntu | upstream | * |