cve/2005/CVE-2005-1686.md
2024-06-18 02:51:15 +02:00

19 lines
1000 B
Markdown

### [CVE-2005-1686](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1686)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename. NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.
### POC
#### Reference
- http://marc.info/?l=bugtraq&m=111661117701398&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9845
#### Github
No PoCs found on GitHub currently.