Upstream information

CVE-2005-1686 at MITRE

Description

Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename. NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 2.6
Vector AV:N/AC:H/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
SUSE Bugzilla entry: 90339 [RESOLVED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Novell Linux Desktop 9 for x86
Novell Linux Desktop 9 for x86_64
  • gedit >= 2.6.1-2.6
suse91.ppc
suse91.x86
suse91.s390
suse91.ia64
YOU Patch Nr: 10253
Open Enterprise Server
  • gedit >= 2.4.1-52.4
suse91.ppc
suse91.x86
suse91.s390
suse91.ia64
YOU Patch Nr: 10253
SUSE LINUX 9.1 for IA32
SUSE LINUX 9.1 for x86-64
  • gedit >= 2.4.1-52.4
SUSE LINUX 9.2
  • gedit >= 2.6.1-8.2
SUSE LINUX 9.3
  • gedit >= 2.10.0-4.2
SuSE Linux Desktop 1.0
  • gedit2 >= 2.2.0.1-162
Builds