This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Gnome First view 2009-03-14
Product Glib Last view 2023-09-14
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:gnome:glib:2.0:*:*:*:*:*:*:* 18
cpe:2.3:a:gnome:glib:1.2.1:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.0.1:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.14.4:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.7.2:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.11.3:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.14.0:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.15.3:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:1.2.0:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.4.6:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.6.1:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.12.2:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:1.3.11:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.9.3:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.13.1:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:1.3.9:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:1.2.2:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.16.1:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.15.1:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.0.3:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:1.2.4:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.8.0:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.2.3:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.3.4:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.6.2:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:1.3.10:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.12.12:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.14.6:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.16.4:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.2.1:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.14.5:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.16.3:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.4.8:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.7.0:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.5.3:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.6.4:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:1.2.3:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.8.4:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.3.2:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.7.6:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.12.3:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:1.3.13:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.9.0:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.10.1:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:1.2.6:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.5.6:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.1.1:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.6.5:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.14.3:*:*:*:*:*:*:* 17
cpe:2.3:a:gnome:glib:2.16.2:*:*:*:*:*:*:* 17

Related : CVE

  Date Alert Description
5.5 2023-09-14 CVE-2023-32665

A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.

7.8 2023-09-14 CVE-2023-32643

A flaw was found in GLib. The GVariant deserialization code is vulnerable to a heap buffer overflow introduced by the fix for CVE-2023-32665. This bug does not affect any released version of GLib, but does affect GLib distributors who followed the guidance of GLib developers to backport the initial fix for CVE-2023-32665.

7.5 2023-09-14 CVE-2023-32636

A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.

5.5 2023-09-14 CVE-2023-32611

A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.

7.5 2023-09-14 CVE-2023-29499

A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.

5.5 2022-08-23 CVE-2021-3800

A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.

5.3 2021-03-11 CVE-2021-28153

An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

7.5 2021-02-15 CVE-2021-27219

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.

7.5 2021-02-15 CVE-2021-27218

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

7.8 2020-12-14 CVE-2020-35457

GNOME GLib before 2.65.3 has an integer overflow, that might lead to an out-of-bounds write, in g_option_group_add_entries. NOTE: the vendor's position is "Realistically this is not a security issue. The standard pattern is for callers to provide a static list of option entries in a fixed number of calls to g_option_group_add_entries()." The researcher states that this pattern is undocumented

5.9 2020-01-09 CVE-2020-6750

GSocketClient in GNOME GLib through 2.62.4 may occasionally connect directly to a target address instead of connecting via a proxy server when configured to do so, because the proxy_addr field is mishandled. This bug is timing-dependent and may occur only sporadically depending on network delays. The greatest security relevance is in use cases where a proxy is used to help with privacy/anonymity, even though there is no technical barrier to a direct connection. NOTE: versions before 2.60 are unaffected.

7.5 2019-06-28 CVE-2019-13012

The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents (kfsb->file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories, 0777 permissions are used; for files, default file permissions are used. This is similar to CVE-2019-12450.

9.8 2019-05-29 CVE-2019-12450

file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.

6.5 2019-03-08 CVE-2019-9633

gio/gsocketclient.c in GNOME GLib 2.59.2 does not ensure that a parent GTask remains alive during the execution of a connection-attempting enumeration, which allows remote attackers to cause a denial of service (g_socket_client_connected_callback mishandling and application crash) via a crafted web site, as demonstrated by GNOME Web (aka Epiphany).

7.5 2018-09-03 CVE-2018-16429

GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().

9.8 2018-09-03 CVE-2018-16428

In GNOME GLib 2.56.1, g_markup_parse_context_end_parse() in gmarkup.c has a NULL pointer dereference.

6.8 2013-12-12 CVE-2013-1978

Heap-based buffer overflow in the read_xwd_cols function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an X Window System (XWD) image dump with more colors than color map entries.

6.8 2013-12-12 CVE-2013-1913

Integer overflow in the load_image function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier, when used with glib before 2.24, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large color entries value in an X Window System (XWD) image dump.

5 2012-01-14 CVE-2012-0039

GLib 2.31.8 and earlier, when the g_str_hash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this issue may be disputed by the vendor; the existence of the g_str_hash function is not a vulnerability in the library, because callers of g_hash_table_new and g_hash_table_new_full can specify an arbitrary hash function that is appropriate for the application.

7.8 2009-09-22 CVE-2009-3289

The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.

4.6 2009-03-14 CVE-2008-4316

Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.

CWE : Common Weakness Enumeration

%idName
13% (3) CWE-787 Out-of-bounds Write
9% (2) CWE-732 Incorrect Permission Assignment for Critical Resource
9% (2) CWE-681 Incorrect Conversion between Numeric Types
9% (2) CWE-502 Deserialization of Untrusted Data
9% (2) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
9% (2) CWE-190 Integer Overflow or Wraparound
4% (1) CWE-754 Improper Check for Unusual or Exceptional Conditions
4% (1) CWE-476 NULL Pointer Dereference
4% (1) CWE-362 Race Condition
4% (1) CWE-310 Cryptographic Issues
4% (1) CWE-276 Incorrect Default Permissions
4% (1) CWE-200 Information Exposure
4% (1) CWE-189 Numeric Errors
4% (1) CWE-125 Out-of-bounds Read
4% (1) CWE-59 Improper Link Resolution Before File Access ('Link Following')

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs
CAPEC-17 Accessing, Modifying or Executing Executable Files
CAPEC-60 Reusing Session IDs (aka Session Replay)
CAPEC-61 Session Fixation
CAPEC-62 Cross Site Request Forgery (aka Session Riding)
CAPEC-122 Exploitation of Authorization
CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels
CAPEC-232 Exploitation of Privilege/Trust
CAPEC-234 Hijacking a privileged process

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:8360 VMware glib2 vulnerability
oval:org.mitre.oval:def:8105 DSA-1747 glib2.0 -- integer overflow
oval:org.mitre.oval:def:13879 USN-738-1 -- glib2.0 vulnerability
oval:org.mitre.oval:def:13648 DSA-1747-1 glib2.0 -- integer overflow
oval:org.mitre.oval:def:11401 Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow contex...
oval:org.mitre.oval:def:22678 ELSA-2009:0336: glib2 security update (Moderate)
oval:org.mitre.oval:def:29068 RHSA-2009:0336 -- glib2 security update (Moderate)
oval:org.mitre.oval:def:13014 USN-841-1 -- glib2.0 vulnerability
oval:org.mitre.oval:def:21262 RHSA-2013:1778: gimp security update (Moderate)
oval:org.mitre.oval:def:21054 USN-2051-1 -- gimp vulnerability
oval:org.mitre.oval:def:23838 ELSA-2013:1778: gimp security update (Moderate)
oval:org.mitre.oval:def:23398 DEPRECATED: ELSA-2013:1778: gimp security update (Moderate)
oval:org.mitre.oval:def:27009 DEPRECATED: ELSA-2013-1778 -- gimp security update (moderate)

Open Source Vulnerability Database (OSVDB)

id Description
58345 glib g_file_copy Function Symlink Arbitrary File Permission Modification
56386 GLib glib/gbase64.c Base64 Conversion Overflow

OpenVAS Exploits

id Description
2009-10-13 Name : Ubuntu USN-841-1 (glib2.0)
File : nvt/ubuntu_841_1.nasl
2009-10-11 Name : SLES11: Security update for glib2
File : nvt/sles11_glib2.nasl
2009-09-28 Name : Mandrake Security Advisory MDVSA-2009:245 (glib2.0)
File : nvt/mdksa_2009_245.nasl
2009-06-05 Name : Ubuntu USN-744-1 (lcms)
File : nvt/ubuntu_744_1.nasl
2009-06-05 Name : Ubuntu USN-743-1 (gs-gpl)
File : nvt/ubuntu_743_1.nasl
2009-04-28 Name : Fedora Core 10 FEDORA-2009-2657 (glib2)
File : nvt/fcore_2009_2657.nasl
2009-04-28 Name : SuSE Security Advisory SUSE-SA:2009:026 (glib2)
File : nvt/suse_sa_2009_026.nasl
2009-04-06 Name : Mandrake Security Advisory MDVSA-2009:085 (gstreamer0.10-plugins-base)
File : nvt/mdksa_2009_085.nasl
2009-04-06 Name : Mandrake Security Advisory MDVSA-2009:080 (glib2.0)
File : nvt/mdksa_2009_080.nasl
2009-04-06 Name : Gentoo Security Advisory GLSA 200904-02 (glib)
File : nvt/glsa_200904_02.nasl
2009-04-06 Name : Fedora Core 9 FEDORA-2009-2688 (glib2)
File : nvt/fcore_2009_2688.nasl
2009-04-06 Name : Ubuntu USN-746-1 (xine-lib)
File : nvt/ubuntu_746_1.nasl
2009-04-06 Name : Ubuntu USN-747-1 (icu)
File : nvt/ubuntu_747_1.nasl
2009-03-31 Name : RedHat Security Advisory RHSA-2009:0336
File : nvt/RHSA_2009_0336.nasl
2009-03-31 Name : Debian Security Advisory DSA 1747-1 (glib2.0)
File : nvt/deb_1747_1.nasl
2009-03-20 Name : Ubuntu USN-733-1 (evolution-data-server)
File : nvt/ubuntu_733_1.nasl
2009-03-20 Name : Ubuntu USN-734-1 (ffmpeg-debian)
File : nvt/ubuntu_734_1.nasl
2009-03-20 Name : Ubuntu USN-738-1 (glib2.0)
File : nvt/ubuntu_738_1.nasl
0000-00-00 Name : Slackware Advisory SSA:2009-086-02 glib2
File : nvt/esoft_slk_ssa_2009_086_02.nasl

Snort® IPS/IDS

Date Description
2014-01-18 GIMP XWD file heap buffer overflow attempt
RuleID : 29010 - Type : FILE-OTHER - Revision : 3
2014-01-18 GIMP XWD file heap buffer overflow attempt
RuleID : 29009 - Type : FILE-OTHER - Revision : 2

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-f76e6d17f1.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-39be36e9fc.nasl - Type: ACT_GATHER_INFO
2016-03-08 Name: The remote VMware ESX host is missing a security-related patch.
File: vmware_VMSA-2010-0004_remote.nasl - Type: ACT_GATHER_INFO
2016-03-07 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201603-01.nasl - Type: ACT_GATHER_INFO
2014-02-11 Name: The remote SuSE 11 host is missing one or more security updates.
File: suse_11_gimp-140203.nasl - Type: ACT_GATHER_INFO
2013-12-18 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2013-293.nasl - Type: ACT_GATHER_INFO
2013-12-17 Name: The remote Fedora host is missing a security update.
File: fedora_2013-22771.nasl - Type: ACT_GATHER_INFO
2013-12-17 Name: The remote Fedora host is missing a security update.
File: fedora_2013-22776.nasl - Type: ACT_GATHER_INFO
2013-12-14 Name: The remote Fedora host is missing a security update.
File: fedora_2013-22701.nasl - Type: ACT_GATHER_INFO
2013-12-10 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-2813.nasl - Type: ACT_GATHER_INFO
2013-12-10 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2051-1.nasl - Type: ACT_GATHER_INFO
2013-12-10 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20131203_gimp_on_SL5_x.nasl - Type: ACT_GATHER_INFO
2013-12-04 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2013-1778.nasl - Type: ACT_GATHER_INFO
2013-12-04 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2013-1778.nasl - Type: ACT_GATHER_INFO
2013-12-04 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2013-1778.nasl - Type: ACT_GATHER_INFO
2013-07-12 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2009-0336.nasl - Type: ACT_GATHER_INFO
2012-08-01 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20090324_glib2_on_SL5_x.nasl - Type: ACT_GATHER_INFO
2010-12-02 Name: The remote SuSE 11 host is missing one or more security updates.
File: suse_11_glib2-100119.nasl - Type: ACT_GATHER_INFO
2010-04-27 Name: The remote openSUSE host is missing a security update.
File: suse_11_0_glib2-100119.nasl - Type: ACT_GATHER_INFO
2010-04-27 Name: The remote openSUSE host is missing a security update.
File: suse_11_1_glib2-100119.nasl - Type: ACT_GATHER_INFO
2010-03-05 Name: The remote VMware ESX host is missing one or more security-related patches.
File: vmware_VMSA-2010-0004.nasl - Type: ACT_GATHER_INFO
2009-10-06 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-841-1.nasl - Type: ACT_GATHER_INFO
2009-09-25 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2009-245.nasl - Type: ACT_GATHER_INFO
2009-09-24 Name: The remote SuSE 11 host is missing one or more security updates.
File: suse_11_glib2-090422.nasl - Type: ACT_GATHER_INFO
2009-07-21 Name: The remote openSUSE host is missing a security update.
File: suse_11_1_glib2-090422.nasl - Type: ACT_GATHER_INFO