Vulnerability Name: | CVE-2005-2958 (CCN-22875) | ||||||||||||
Assigned: | 2005-10-25 | ||||||||||||
Published: | 2005-10-25 | ||||||||||||
Updated: | 2018-10-03 | ||||||||||||
Summary: | Multiple format string vulnerabilities in the GNOME Data Access library for GNOME2 (libgda2) 1.2.1 and earlier allow attackers to execute arbitrary code. | ||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2005-2958 Source: CCN Type: SA17323 GNOME-DB libgda Logging Functions Format String Vulnerabilities Source: SECUNIA Type: UNKNOWN 17323 Source: SECUNIA Type: UNKNOWN 17339 Source: SECUNIA Type: UNKNOWN 17391 Source: SECUNIA Type: UNKNOWN 17426 Source: SECUNIA Type: UNKNOWN 17500 Source: SECUNIA Type: UNKNOWN 17559 Source: CCN Type: SECTRACK ID: 1015107 libgda2 Format String Bugs May Let Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1015107 Source: DEBIAN Type: Patch, Vendor Advisory DSA-871 Source: DEBIAN Type: DSA-871 libgda2 -- format string Source: CCN Type: GLSA-200511-01 libgda: Format string vulnerabilities Source: GENTOO Type: UNKNOWN GLSA-200511-01 Source: MANDRIVA Type: UNKNOWN MDKSA-2005:203 Source: SUSE Type: UNKNOWN SUSE-SR:2005:027 Source: CCN Type: OSVDB ID: 20315 GNOME-DB libgda Logging Function Multiple Format String Source: FEDORA Type: UNKNOWN FEDORA-2005-1029 Source: BID Type: UNKNOWN 15200 Source: CCN Type: BID-15200 LibGDA Multiple Format String Vulnerabilities Source: CCN Type: USN-212-1 libgda2 vulnerability Source: XF Type: UNKNOWN libgda2-format-string(22875) Source: UBUNTU Type: UNKNOWN USN-212-1 Source: SUSE Type: SUSE-SR:2005:025 SUSE Security Summary Report Source: SUSE Type: SUSE-SR:2005:026 SUSE Security Summary Report Source: SUSE Type: SUSE-SR:2005:027 SUSE Security Summary Report | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |