Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Glib | Gnome | * | 2.16.4 (including) |
| Glib | Gnome | 2.2.1 (including) | 2.2.1 (including) |
| Glib | Gnome | 2.14.5 (including) | 2.14.5 (including) |
| Glib | Gnome | 2.14.6 (including) | 2.14.6 (including) |
| Glib | Gnome | 2.16.3 (including) | 2.16.3 (including) |
| Red Hat Enterprise Linux 5 | RedHat | glib2-0:2.12.3-4.el5_3.1 | * |
| Glib2.0 | Ubuntu | gutsy | * |
| Glib2.0 | Ubuntu | hardy | * |
| Glib2.0 | Ubuntu | intrepid | * |
| Glib2.0 | Ubuntu | upstream | * |