|
Family: Ubuntu Local Security Checks --> Category: infos
USN138-1 : gedit vulnerability Vulnerability Scan
Vulnerability Scan Summary gedit vulnerability
Detailed Explanation for this Vulnerability Test
Synopsis :
These remote packages are missing security patches :
- gedit
- gedit-common
- gedit-dev
Description :
A format string vulnerability has been discovered in gedit. Calling
the program with specially crafted file names caused a buffer
overflow, which could be exploited to execute arbitrary code with the
rights of the gedit user.
This becomes security relevant if e. g. your web browser is configued
to open URLs in gedit. If you never open untrusted file names or URLs
in gedit, this flaw does not affect you.
Solution :
Upgrade to :
- gedit-2.10.2-0ubuntu2 (Ubuntu 5.04)
- gedit-common-2.10.2-0ubuntu2 (Ubuntu 5.04)
- gedit-dev-2.10.2-0ubuntu2 (Ubuntu 5.04)
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|