Metrics
Affected Vendors & Products
Tue, 25 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 25 Mar 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in GNOME libgsf up to 1.14.53. It has been classified as critical. This affects the function gsf_base64_encode_simple. The manipulation of the argument size_t leads to heap-based buffer overflow. An attack has to be approached locally. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | GNOME libgsf gsf_base64_encode_simple heap-based overflow | |
Weaknesses | CWE-119 CWE-122 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-03-25T00:00:10.522Z
Updated: 2025-03-25T13:59:31.520Z
Reserved: 2025-03-24T12:46:21.132Z
Link: CVE-2025-2721

Updated: 2025-03-25T13:53:39.273Z

Status : Received
Published: 2025-03-25T00:15:15.693
Modified: 2025-03-25T00:15:15.693
Link: CVE-2025-2721

No data.