{"vuid":"VU#363001","idnumber":"363001","name":"Eye of Gnome contains format string vulnerability in the file name handling of command line arguments","keywords":["Eye of Gnome","EOG","format string","filename handling","command line arguments","arbitrary code execution"],"overview":"Eye of Gnome contains a format string vulnerability that may allow remote attackers to execute arbitrary code with the privileges of the user running the application, typically an unprivileged system user.","clean_desc":"Eye of Gnome (EOG) is an image viewing application that is part of the GNOME desktop suite. Researchers from Core Security Technologies have discovered a format string vulnerability in the command line parser of this product. The vulnerability exists in a section of the command line parser that processes file names.","impact":"This vulnerability may allow remote attackers to execute arbitrary code with the privileges of the user running EOG, typically an unprivileged system user.","resolution":"Apply a patch The vendor section of this document lists vendors and their responses to this vulnerability.","workarounds":"","sysaffected":"","thanks":"The CERT/CC thanks Core Security Technologies for discovering this vulnerability and working with the vendor to address it.","author":"This document was written by Jeffrey P. Lanza.","public":["http://www.coresecurity.com/common/showdoc.php?idx=312&idxseccion=10","http://www.securityfocus.com/bid/7121"],"cveids":["CVE-2003-0165"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-03-20T17:45:16Z","publicdate":"2003-03-20T00:00:00Z","datefirstpublished":"2003-04-04T20:11:02Z","dateupdated":"2003-04-17T23:14:03Z","revision":7,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"10","cam_internetinfrastructure":"1","cam_population":"5","cam_impact":"10","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"4.875","cam_scorecurrentwidelyknown":"5.8125","cam_scorecurrentwidelyknownexploited":"7.6875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.875,"vulnote":null}