CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
94.3%
Format string vulnerability in the window_error function in yelp-window.c in yelp in Gnome after 2.19.90 and before 2.24 allows remote attackers to execute arbitrary code via format string specifiers in an invalid URI on the command line, as demonstrated by use of yelp within (1) man or (2) ghelp URI handlers in Firefox, Evolution, and unspecified other programs.
bugzilla.gnome.org/attachment.cgi?id=115890
bugzilla.gnome.org/show_bug.cgi?id=546364
lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html
secunia.com/advisories/31465
secunia.com/advisories/31620
secunia.com/advisories/31834
secunia.com/advisories/32629
www.mandriva.com/security/advisories?name=MDVSA-2008:175
www.securityfocus.com/bid/30690
www.ubuntu.com/usn/usn-638-1
www.vupen.com/english/advisories/2008/2393
bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860
exchange.xforce.ibmcloud.com/vulnerabilities/44449
www.redhat.com/archives/fedora-package-announce/2008-September/msg00222.html