Vulnerability Details : CVE-2005-2975
io-xpm.c in the gdk-pixbuf XPM image rendering library in GTK+ before 2.8.7 allows attackers to cause a denial of service (infinite loop) via a crafted XPM image with a large number of colors.
Vulnerability category: Denial of service
Exploit prediction scoring system (EPSS) score for CVE-2005-2975
Probability of exploitation activity in the next 30 days: 0.87%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 80 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-2975
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST |
CWE ids for CVE-2005-2975
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2005-2975
-
Red Hat 2007-03-14Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9697
Broken Link
-
http://secunia.com/advisories/17591
Broken Link;Vendor Advisory
-
http://www.securityfocus.com/bid/15429
Third Party Advisory;VDB Entry
-
http://secunia.com/advisories/17791
Broken Link;Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
Advisories - Mandriva LinuxBroken Link
-
http://secunia.com/advisories/17615
Broken Link;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2005-810.html
Patch;Third Party Advisory;Vendor Advisory
-
http://www.debian.org/security/2005/dsa-913
Third Party Advisory
-
http://www.ubuntu.com/usn/usn-216-1
Third Party Advisory
-
http://www.debian.org/security/2005/dsa-911
Third Party Advisory
-
http://secunia.com/advisories/17594
Broken Link;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2005-811.html
Third Party Advisory
-
http://secunia.com/advisories/17710
Broken Link;Vendor Advisory
-
http://www.vupen.com/english/advisories/2005/2433
Vendor Advisory
-
http://www.securityfocus.com/archive/1/428052/100/0/threaded
Broken Link;Third Party Advisory;VDB Entry
-
http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml
Third Party Advisory
-
http://secunia.com/advisories/17770
Broken Link;Vendor Advisory
-
http://secunia.com/advisories/17538
Broken Link;Vendor Advisory
-
http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf
Third Party Advisory
-
http://secunia.com/advisories/17588
Broken Link;Vendor Advisory
-
http://secunia.com/advisories/17592
Broken Link
-
http://secunia.com/advisories/17657
About Secunia Research | FlexeraBroken Link;Vendor Advisory
-
http://secunia.com/advisories/17562
Broken Link;Vendor Advisory
-
http://www.novell.com/linux/security/advisories/2005_65_gtk2.html
Third Party Advisory
-
http://securitytracker.com/id?1015216
Broken Link;Third Party Advisory;VDB Entry
-
http://secunia.com/advisories/17522
Broken Link;Vendor Advisory
- cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*