search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Eye of Gnome contains format string vulnerability in the file name handling of command line arguments

Vulnerability Note VU#363001

Original Release Date: 2003-04-04 | Last Revised: 2003-04-17

Overview

Eye of Gnome contains a format string vulnerability that may allow remote attackers to execute arbitrary code with the privileges of the user running the application, typically an unprivileged system user.

Description

Eye of Gnome (EOG) is an image viewing application that is part of the GNOME desktop suite. Researchers from Core Security Technologies have discovered a format string vulnerability in the command line parser of this product. The vulnerability exists in a section of the command line parser that processes file names.

Impact

This vulnerability may allow remote attackers to execute arbitrary code with the privileges of the user running EOG, typically an unprivileged system user.

Solution

Apply a patch

The vendor section of this document lists vendors and their responses to this vulnerability.

Vendor Information

363001
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

The CERT/CC thanks Core Security Technologies for discovering this vulnerability and working with the vendor to address it.

This document was written by Jeffrey P. Lanza.

Other Information

CVE IDs: CVE-2003-0165
Severity Metric: 4.88
Date Public: 2003-03-20
Date First Published: 2003-04-04
Date Last Updated: 2003-04-17 23:14 UTC
Document Revision: 7

Sponsored by CISA.