Metrics
Affected Vendors & Products
Wed, 26 Mar 2025 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 25 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 25 Mar 2025 01:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in GNOME libgsf up to 1.14.53. It has been rated as critical. This issue affects the function gsf_property_settings_collec. The manipulation of the argument n_alloced_params leads to heap-based buffer overflow. Attacking locally is a requirement. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | GNOME libgsf gsf_property_settings_collec heap-based overflow | |
Weaknesses | CWE-119 CWE-122 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-03-25T01:00:06.666Z
Updated: 2025-03-25T13:26:03.279Z
Reserved: 2025-03-24T12:46:32.307Z
Link: CVE-2025-2723

Updated: 2025-03-25T13:25:59.563Z

Status : Received
Published: 2025-03-25T01:15:11.800
Modified: 2025-03-25T01:15:11.800
Link: CVE-2025-2723
