CVE-2005-2975
Summary
| CVE | CVE-2005-2975 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-11-18 06:03:00 UTC |
| Updated | 2023-08-11 20:12:00 UTC |
| Description | io-xpm.c in the gdk-pixbuf XPM image rendering library in GTK+ before 2.8.7 allows attackers to cause a denial of service (infinite loop) via a crafted XPM image with a large number of colors. |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|
| Application |
Gnome |
Gdkpixbuf |
All |
All |
All |
All |
| Application |
Gnome |
Gdkpixbuf |
All |
All |
All |
All |
| Application |
Gnome |
Gtk |
All |
All |
All |
All |
| Application |
Gtk |
Gtk |
All |
All |
All |
All |
| Application |
Gtk |
Gtk |
1.2.8 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.0 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.1 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.18 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.2 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.3 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.4 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.5 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.6 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.7 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.8 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.9 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.2.1 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.2.3 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.2.4 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.4.0 |
All |
All |
All |
| Application |
Gtk |
Gtk |
All |
All |
All |
All |
| Application |
Gtk |
Gtk |
1.2.8 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.0 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.1 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.18 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.2 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.3 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.4 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.5 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.6 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.7 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.8 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.9 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.2.1 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.2.3 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.2.4 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.4.0 |
All |
All |
All |
| Application |
Gtk |
Gtk |
All |
All |
All |
All |
| Application |
Gtk |
Gtk |
1.2.8 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.0 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.1 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.18 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.2 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.3 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.4 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.5 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.6 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.7 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.8 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.0.9 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.2.1 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.2.3 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.2.4 |
All |
All |
All |
| Application |
Gtk |
Gtk |
2.4.0 |
All |
All |
All |
References
| Reference | Source | Link | Tags |
|---|
| Secunia - Advisories - Fedora update for gdk-pixbuf |
SECUNIA |
secunia.com |
|
| Secunia - Advisories - Debian update for gtk+2.0 |
SECUNIA |
secunia.com |
Vendor Advisory |
| Debian -- Security Information -- DSA-911-1 gtk+2.0 |
DEBIAN |
www.debian.org |
|
| Secunia - Advisories - Red Hat update for gdk-pixbuf |
SECUNIA |
secunia.com |
Vendor Advisory |
| Secunia - Advisories - Mandriva update for gdk-pixbuf |
SECUNIA |
secunia.com |
Vendor Advisory |
| rhn.redhat.com | Red Hat Support |
REDHAT |
www.redhat.com |
|
| GDK-Pixbuf/GTK XPM Images Infinite Loop Denial Of Service Vulnerability |
BID |
www.securityfocus.com |
|
| SecurityFocus |
FEDORA |
www.securityfocus.com |
|
| Debian -- Security Information -- DSA-913-1 gdk-pixbuf |
DEBIAN |
www.debian.org |
|
| Secunia - Advisories - Ubuntu update for gtk2-engines-pixbuf / libgdk-pixbuf2 |
SECUNIA |
secunia.com |
Vendor Advisory |
| support.avaya.com/elmodocs2/security/ASA-2005-229.pdf |
CONFIRM |
support.avaya.com |
|
| usn/usn-216-1 - Ubuntu Linux |
UBUNTU |
www.ubuntu.com |
|
| Secunia - Advisories - SUSE update for gtk2/gdk-pixbuf |
SECUNIA |
secunia.com |
Vendor Advisory |
| SecurityTracker.com Archives - gdk-pixbuf Bugs in Processing XPM Images Let Remote Users Deny Service or Execute Arbitrary Code |
SECTRACK |
securitytracker.com |
|
| 404 Page Not Found | SUSE |
SUSE |
www.novell.com |
|
| Secunia - Advisories - Gentoo update for gtk+/gdk-pixbuf |
SECUNIA |
secunia.com |
Vendor Advisory |
| Secunia - Advisories - GTK+ GdkPixbuf XPM Image Rendering Library Multiple Vulnerabilities |
SECUNIA |
secunia.com |
Vendor Advisory |
| Secunia - Advisories - Fedora update for gtk2 |
SECUNIA |
secunia.com |
Vendor Advisory |
| Repository / Oval Repository |
OVAL |
oval.cisecurity.org |
|
| Secunia - Advisories - Red Hat update for gtk2 |
SECUNIA |
secunia.com |
Vendor Advisory |
| Advisories - Mandriva Linux |
MANDRIVA |
www.mandriva.com |
|
| Gentoo Linux Documentation
--
GTK+ 2, GdkPixbuf: Multiple XPM decoding vulnerabilities |
GENTOO |
www.gentoo.org |
|
| Webmail - OVH |
VUPEN |
www.vupen.com |
Vendor Advisory |
| rhn.redhat.com | Red Hat Support |
REDHAT |
www.redhat.com |
Patch, Vendor Advisory |
| Secunia - Advisories - Debian update for gdk-pixbuf |
SECUNIA |
secunia.com |
Vendor Advisory |
| Secunia - Advisories - Avaya Products GdkPixbuf XPM Image Multiple Vulnerabilities |
SECUNIA |
secunia.com |
Vendor Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|
| Red Hat | 2007-03-14 | Mark J Cox | Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. |
There are currently no legacy QID mappings associated with this CVE.