Description
Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1747-1 | New glib2.0 packages fix arbitrary code execution |
EUVD |
EUVD-2008-4297 | Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation. |
Ubuntu USN |
USN-738-1 | GLib vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T10:08:34.978Z
Reserved: 2008-09-29T00:00:00.000Z
Link: CVE-2008-4316
No data.
Status : Modified
Published: 2009-03-14T18:30:00.343
Modified: 2026-04-23T00:35:47.467
Link: CVE-2008-4316
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN