{"vuid":"VU#814557","idnumber":"814557","name":"GNOME gedit contains format string vulnerability","keywords":["GNOME","gedit","format string","binary filenames","arbitrary code execution"],"overview":"gedit has a format string vulnerability in some error dialogs that can occur when a file is opened for editing.","clean_desc":"gedit is the official text editor of the GNOME desktop environment. gedit 2.10.2 has a format string error in some some error dialogs that can occur when a file is opened for editing. Some of the messages in these dialogs, which can contain the name of the file being opened, are interpreted as format strings. Versions prior to v2.10.2 may also be vulnerable.","impact":"An attacker can execute arbitrary code if a user can be coerced to open a file with a particular name.","resolution":"Upgrade to gedit v2.10.3 or later.","workarounds":"","sysaffected":"","thanks":"This issue was discovered by jsk:exworm of www.0xbadexworm.org.","author":"This document was written by Hal Burch.","public":["http://secunia.com/advisories/15454/","http://www.securityfocus.com/bid/13699","http://www.securityfocus.com/archive/1/401869","http://www.securityfocus.com/archive/1/402048","http://mail.gnome.org/archives/gnome-announce-list/2005-June/msg00006.html","http://security.gentoo.org/glsa/glsa-200506-09.xml","https://www.ubuntulinux.org/support/documentation/usn/usn-138-1","http://rhn.redhat.com/errata/RHSA-2005-499.html","http://www.mandriva.com/security/advisories?name=MDKSA-2005:102","http://securitytracker.com/alerts/2005/Jun/1014179.html","http://www.debian.org/security/2005/dsa-753","http://www.auscert.org.au/5269"],"cveids":["CVE-2005-1686"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-05-24T19:59:27Z","publicdate":"2005-05-24T00:00:00Z","datefirstpublished":"2005-08-12T18:44:33Z","dateupdated":"2005-08-15T12:52:45Z","revision":27,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"2","cam_population":"10","cam_impact":"13","cam_easeofexploitation":"3","cam_attackeraccessrequired":"6","cam_scorecurrent":"0.96525","cam_scorecurrentwidelyknown":"0.96525","cam_scorecurrentwidelyknownexploited":"1.84275","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.96525,"vulnote":null}