CVE-2007-6183

Source
https://nvd.nist.gov/vuln/detail/CVE-2007-6183
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2007-6183.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2007-6183
Aliases
Related
Withdrawn
2024-06-30T13:40:11.216389Z
Published
2007-11-30T00:46:00Z
Modified
2024-04-11T07:40:48Z
Summary
[none]
Details

Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter.

References

Affected packages

Debian:10 / ruby-gnome2

Package

Name
ruby-gnome2
Purl
pkg:deb/debian/ruby-gnome2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.16.0-10

Ecosystem specific

{
    "urgency": "medium"
}