Family: Ubuntu Local Security Checks --> Category: infos
USN138-1 : gedit vulnerability Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
These remote packages are missing security patches :
A format string vulnerability has been discovered in gedit. Calling
the program with specially crafted file names caused a buffer
overflow, which could be exploited to execute arbitrary code with the
rights of the gedit user.
This becomes security relevant if e. g. your web browser is configued
to open URLs in gedit. If you never open untrusted file names or URLs
in gedit, this flaw does not affect you.
Upgrade to :
- gedit-2.10.2-0ubuntu2 (Ubuntu 5.04)
- gedit-common-2.10.2-0ubuntu2 (Ubuntu 5.04)
- gedit-dev-2.10.2-0ubuntu2 (Ubuntu 5.04)
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.