CVE-2008-4316

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2008-4316
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2008-4316.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2008-4316
Related
Published
2009-03-14T18:30:00Z
Modified
2024-06-30T12:00:03Z
Summary
[none]
Details

Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.

References

Affected packages

Debian:11 / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/debian/glib2.0?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.20.0-1

Ecosystem specific

{
    "urgency": "medium"
}

Debian:12 / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/debian/glib2.0?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.20.0-1

Ecosystem specific

{
    "urgency": "medium"
}

Debian:13 / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/debian/glib2.0?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.20.0-1

Ecosystem specific

{
    "urgency": "medium"
}