Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2003-0165Use of Externally-Controlled Format String in EOG

7 documents7 sources
Severity
4.6MEDIUMNVD
EPSS
0.7%
top 26.80%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedApr 2
Latest updateApr 29

Description

Format string vulnerability in Eye Of Gnome (EOG) allows attackers to execute arbitrary code via format string specifiers in a command line argument for the file to display.

CVSS vector

AV:L/AC:L/C:P/I:P/A:PExploitability: 3.9 | Impact: 6.4

Affected Packages3 packages

Debiangnome/eog< 2.2.1+3
NVDgnome/eog10 versions+9
debiandebian/eog< eog 2.2.1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-wxqm-488m-v2xg: Format string vulnerability in Eye Of Gnome (EOG) allows attackers to execute arbitrary code via format string specifiers in a command line argument f2022-04-29
OSV
CVE-2003-0165: Format string vulnerability in Eye Of Gnome (EOG) allows attackers to execute arbitrary code via format string specifiers in a command line argument f2003-04-02

💥Exploits & PoCs

1
Exploit-DB
GNOME Eye Of Gnome 1.0.x/1.1.x/2.2 - Format String2003-03-28

📋Vendor Advisories

2
Red Hat
security flaw2003-03-28
Debian
CVE-2003-0165: eog - Format string vulnerability in Eye Of Gnome (EOG) allows attackers to execute ar...2003

💬Community

1
Bugzilla
CVE-2003-0165 security flaw2018-08-16