vendor:
GKrellWeather
by:
Manuel Gebele
7.5
CVSS
HIGH
Local Stack-based Buffer Overflow
120
CWE
Product Name: GKrellWeather
Affected Version From: 2000.2.7
Affected Version To: Unknown
Patch Exists: NO
Related CWE: CVE not provided
CPE: a:gkrellm_project:gkrellweather:0.2.7
Metasploit:
https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2023-22024/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-20212/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2022-24834/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-27395/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-22325/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp9-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/apple-osx-cups-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp9-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-3326/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-0121/, https://www.rapid7.com/db/?q=CVE+not+provided&type=&page=2, https://www.rapid7.com/db/?q=CVE+not+provided&type=&page=3, https://www.rapid7.com/db/?q=CVE+not+provided&type=&page=4, https://www.rapid7.com/db/?q=CVE+not+provided&type=&page=2
Platforms Tested:
Unknown
GKrellWeather Plugin for GKrellM Local Stack-based Buffer Overflow
The GKrellWeather plugin for GKrellM is prone to a local stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized buffer.An attacker can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in denial-of-service conditions.
Mitigation:
It is recommended to update to a patched version of GKrellWeather to mitigate this vulnerability. Additionally, users should exercise caution when running setuid/setgid GTK+ applications.