"value":"Stack-based buffer overflow in the glibtop_get_proc_map_s function in libgtop before 2.14.6 (libgtop2) allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a process with a long filename that is mapped in its address space, which triggers the overflow in gnome-system-monitor."
},
{
"lang":"es",
"value":"Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n glibtop_get_proc_map_s en libgtop anterior a 2.14.6 (libgtop2) permite a usuarios locales provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un proceso con un nombre de fichero largo que es mapeado en su espacio de direcciones, lo cual provoca el desbordamiento en gnome-system-monitor."
}
],
"vendorComments":[
{
"organization":"Red Hat",
"comment":"Not vulnerable. This issue did not affect the versions of libgtop as shipped with Red Hat Enterprise Linux 2.1 or 3.\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.\n\nThis flaw affects Red Hat Enterprise Linux 4 and is being tracked via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=249884",