Revision Date: | 2013-04-29 | Version: | 10 |
Title: | Stack-based buffer overflow in the glibtop_get_proc_map_s function in libgtop before 2.14.6 (libgtop2) allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a process with a long filename that is mapped in its address space, which triggers the overflow in gnome-system-monitor. |
Description: | Stack-based buffer overflow in the glibtop_get_proc_map_s function in libgtop before 2.14.6 (libgtop2) allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a process with a long filename that is mapped in its address space, which triggers the overflow in gnome-system-monitor. |
Family: | unix | Class: | vulnerability |
Status: | ACCEPTED | Reference(s): | CVE-2007-0235
|
Platform(s): | CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 4
| Product(s): | |
Definition Synopsis |
RHEL4, CentOS4 or Oracle Linux 4 The operating system installed on the system is Red Hat Enterprise Linux 4
OR CentOS Linux 4.x
OR Oracle Linux 4.x
AND Configuration section
libgtop2 is earlier than 0:2.8.0-1.0.2
OR libgtop2-devel is earlier than 0:2.8.0-1.0.2
|