Description
Stack-based buffer overflow in the glibtop_get_proc_map_s function in libgtop before 2.14.6 (libgtop2) allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a process with a long filename that is mapped in its address space, which triggers the overflow in gnome-system-monitor.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1255-1 | New libgtop2 packages fix arbitrary code execution |
EUVD |
EUVD-2007-0237 | Stack-based buffer overflow in the glibtop_get_proc_map_s function in libgtop before 2.14.6 (libgtop2) allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a process with a long filename that is mapped in its address space, which triggers the overflow in gnome-system-monitor. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T12:12:17.587Z
Reserved: 2007-01-16T00:00:00.000Z
Link: CVE-2007-0235
No data.
Status : Modified
Published: 2007-01-16T18:28:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2007-0235
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD