MEDIUM · 6.8

CVE-2007-6183

Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attack...

Vulnerability Description

Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter.

CVSS Score

6.8

MEDIUM

AV:N/AC:M/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
Ruby Gnome2Ruby Gnome20.16.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2007-6183?

CVE-2007-6183 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attack...

How severe is CVE-2007-6183?

CVE-2007-6183 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2007-6183?

Check the references section above for vendor advisories and patch information. Affected products include: Ruby Gnome2 Ruby Gnome2.