cve/2016/CVE-2016-6855.md

25 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2016-6855](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6855)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Eye of GNOME (aka eog) 3.16.5, 3.17.x, 3.18.x before 3.18.3, 3.19.x, and 3.20.x before 3.20.4, when used with glib before 2.44.1, allow remote attackers to cause a denial of service (out-of-bounds write and crash) via vectors involving passing invalid UTF-8 to GMarkup.
### POC
#### Reference
- http://packetstormsecurity.com/files/138486/Gnome-Eye-Of-Gnome-3.10.2-Out-Of-Bounds-Write.html
2024-06-09 00:33:16 +00:00
- http://packetstormsecurity.com/files/138486/Gnome-Eye-Of-Gnome-3.10.2-Out-Of-Bounds-Write.html
2024-05-26 14:27:05 +02:00
- http://www.ubuntu.com/usn/USN-3069-1
2024-06-09 00:33:16 +00:00
- http://www.ubuntu.com/usn/USN-3069-1
2024-05-26 14:27:05 +02:00
- https://bugzilla.gnome.org/show_bug.cgi?id=770143
2024-06-09 00:33:16 +00:00
- https://bugzilla.gnome.org/show_bug.cgi?id=770143
2024-05-26 14:27:05 +02:00
- https://www.exploit-db.com/exploits/40291/
2024-06-09 00:33:16 +00:00
- https://www.exploit-db.com/exploits/40291/
2024-05-26 14:27:05 +02:00
#### Github
- https://github.com/ARPSyndicate/cvemon