Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » GNOME Eye of Gnome buffer overflow

GNOME Eye of Gnome buffer overflow

by Mario Miri on April 8th, 2003 GNOME Eye of Gnome image viewer is prone to a buffer overflow attack if a malicious format specifiers are input at the command line. This may lead to local privilege escalation. Also, a remote exploitation may be possible if EOG is configured as a default image viewer in mailcap.


Vulnerable:
GNOME eog 1.0 .0
GNOME eog 1.0.1
GNOME eog 1.0.2
GNOME eog 1.0.3
GNOME eog 1.0.4
GNOME eog 1.1.1
GNOME eog 1.1.2
GNOME eog 1.1.3
GNOME eog 1.1.4
GNOME eog 2.2.0


Solution:
Patches are available from official Gnome site.


Exploit / Proof of concept:
http://download.xatrix.org/expl/gnome-eog.txt


Discovered by:
Diego Kelyacoubian
Javier Kohen
Alberto Solino
Juan Vera
Core Security Technologies.


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »