CVE-2010-1620
Severity CVSS v4.0:
Pending analysis
Type:
CWE-189
Numeric Errors
Publication date:
12/05/2010
Last modified:
11/04/2025
Description
Integer overflow in the load_iface function in Tools/gdomap.c in gdomap in GNUstep Base before 1.20.0 might allow context-dependent attackers to execute arbitrary code via a (1) file or (2) socket that provides configuration data with many entries, leading to a heap-based buffer overflow.
Impact
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnustep:gnustep_base:*:*:*:*:*:*:*:* | 1.19.3 (including) | |
| cpe:2.3:a:gnustep:gnustep_base:1.11.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnustep:gnustep_base:1.12.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnustep:gnustep_base:1.13.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnustep:gnustep_base:1.14.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnustep:gnustep_base:1.15.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnustep:gnustep_base:1.15.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnustep:gnustep_base:1.15.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnustep:gnustep_base:1.15.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnustep:gnustep_base:1.17.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnustep:gnustep_base:1.18.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnustep:gnustep_base:1.19.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnustep:gnustep_base:1.19.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnustep:gnustep_base:1.19.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://ftpmain.gnustep.org/pub/gnustep/core/gnustep-base-1.20.0.tar.gz
- http://marc.info/?l=oss-security&m=127324274005709&w=2
- http://marc.info/?l=oss-security&m=127325778527537&w=2
- http://savannah.gnu.org/bugs/?29755=
- http://secunia.com/advisories/39746
- http://thread.gmane.org/gmane.comp.lib.gnustep.bugs/12336
- https://bugs.launchpad.net/ubuntu/+source/gnustep-base/+bug/573108
- http://ftpmain.gnustep.org/pub/gnustep/core/gnustep-base-1.20.0.tar.gz
- http://marc.info/?l=oss-security&m=127324274005709&w=2
- http://marc.info/?l=oss-security&m=127325778527537&w=2
- http://savannah.gnu.org/bugs/?29755=
- http://secunia.com/advisories/39746
- http://thread.gmane.org/gmane.comp.lib.gnustep.bugs/12336
- https://bugs.launchpad.net/ubuntu/+source/gnustep-base/+bug/573108



