Vulnerability Name:

CVE-2005-1686 (CCN-20766)

Assigned:2005-05-20
Published:2005-05-20
Updated:2018-10-03
Summary:Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename.
Note: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:2.6 Low (CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2005-1686

Source: CCN
Type: gedit Web page
gedit

Source: BUGTRAQ
Type: UNKNOWN
20050520 pst.advisory: gedit fun. opensource is god .lol windows

Source: CCN
Type: RHSA-2005-499
gedit security update

Source: CCN
Type: SA44252
Oracle Solaris gedit Filename Format String Vulnerability

Source: GENTOO
Type: UNKNOWN
GLSA-200506-09

Source: DEBIAN
Type: UNKNOWN
DSA-753

Source: DEBIAN
Type: DSA-753
gedit -- format string

Source: CCN
Type: GLSA-200506-09
gedit: Format string vulnerability

Source: CCN
Type: US-CERT VU#814557
GNOME gedit contains format string vulnerability

Source: SUSE
Type: UNKNOWN
SUSE-SA:2005:036

Source: REDHAT
Type: UNKNOWN
RHSA-2005:499

Source: CCN
Type: BID-13699
Gedit Filename Format String Vulnerability

Source: CCN
Type: TLSA-2005-70
Format String Vulnerability

Source: CCN
Type: USN-138-1
gedit vulnerability

Source: XF
Type: UNKNOWN
gedit-binary-file-name-format-string(20766)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1245

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9845

Source: UBUNTU
Type: UNKNOWN
USN-138-1

Source: SUSE
Type: SUSE-SA:2005:036
sudo: race condition arbitrary code execution

Vulnerable Configuration:Configuration 1:
  • cpe:/a:gnome:gedit:2.10.2:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20051686
    V
    CVE-2005-1686
    2015-11-16
    oval:org.mitre.oval:def:9845
    V
    Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename. NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.
    2013-04-29
    oval:org.mitre.oval:def:1245
    V
    gedit Format String Vulnerability
    2007-02-20
    oval:org.debian:def:753
    V
    format string
    2005-07-12
    oval:com.redhat.rhsa:def:20050499
    P
    RHSA-2005:499: gedit security update (Moderate)
    2005-06-13
    BACK
    gnome gedit 2.10.2