Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2008-3533 — Use of Externally-Controlled Format String in Yelp
Severity
10.0CRITICALNVD
EPSS
13.4%
top 5.80%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedAug 18
Latest updateMay 2
Description
Format string vulnerability in the window_error function in yelp-window.c in yelp in Gnome after 2.19.90 and before 2.24 allows remote attackers to execute arbitrary code via format string specifiers in an invalid URI on the command line, as demonstrated by use of yelp within (1) man or (2) ghelp URI handlers in Firefox, Evolution, and unspecified other programs.
CVSS vector
AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0
Affected Packages3 packages
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-4mh5-hw23-j38h: Format string vulnerability in the window_error function in yelp-window↗2022-05-02
OSV
▶
CVEList
▶
💥Exploits & PoCs
1📋Vendor Advisories
3💬Community
1Bugzilla▶
CVE-2008-3533 yelp: Invalid URI format string vulnerability (remote arbitrary code execution)↗2008-08-19