Integer overflow in the load_iface function in Tools/gdomap.c in gdomap in GNUstep Base before 1.20.0 might allow context-dependent attackers to execute arbitrary code via a (1) file or (2) socket that provides configuration data with many entries, leading to a heap-based buffer overflow.
ftpmain.gnustep.org/pub/gnustep/core/gnustep-base-1.20.0.tar.gz
marc.info/?l=oss-security&m=127324274005709&w=2
marc.info/?l=oss-security&m=127325778527537&w=2
savannah.gnu.org/bugs/?29755
secunia.com/advisories/39746
thread.gmane.org/gmane.comp.lib.gnustep.bugs/12336
bugs.launchpad.net/ubuntu/+source/gnustep-base/+bug/573108