Vulnerability Description
Format string vulnerability in the permitted function of GNOME libgtop_daemon in libgtop 1.0.12 and earlier allows remote attackers to execute arbitrary code via an argument that contains format specifiers that are passed into the (1) syslog_message and (2) syslog_io_message functions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnome | Libgtop Daemon | 1.0.6 |
References
- ftp://ftp.gnome.org/pub/GNOME/stable/sources/libgtop/libgtop-1.0.13.tar.gz
- http://marc.info/?l=bugtraq&m=100689302316077&w=2
- http://www.debian.org/security/2002/dsa-098PatchVendor Advisory
- ftp://ftp.gnome.org/pub/GNOME/stable/sources/libgtop/libgtop-1.0.13.tar.gz
- http://marc.info/?l=bugtraq&m=100689302316077&w=2
- http://www.debian.org/security/2002/dsa-098PatchVendor Advisory
FAQ
What is CVE-2001-0927?
CVE-2001-0927 is a vulnerability with a CVSS score of 7.5 (HIGH). Format string vulnerability in the permitted function of GNOME libgtop_daemon in libgtop 1.0.12 and earlier allows remote attackers to execute arbitrary code via an argument that contains format speci...
How severe is CVE-2001-0927?
CVE-2001-0927 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-0927?
Check the references section above for vendor advisories and patch information. Affected products include: Gnome Libgtop Daemon.