| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 9.4 | $0-$5k | 0.00 |
Summary
A vulnerability labeled as very critical has been found in GTK GTK+ up to 2.8.8. Affected by this vulnerability is an unknown functionality in the library uxtheme.dll. Executing a manipulation can lead to Remote Code Execution. This vulnerability is tracked as CVE-2010-4833. No exploit exists. The affected component should be upgraded.
Details
A vulnerability has been found in GTK GTK+ up to 2.8.8 and classified as very critical. This vulnerability affects an unknown part in the library uxtheme.dll. The manipulation with an unknown input leads to a remote code execution vulnerability. The CWE definition for the vulnerability is CWE-426. The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
Untrusted search path vulnerability in modules/engines/ms-windows/xp_theme.c in GTK+ before 2.24.0 allows local users to gain privileges via a Trojan horse uxtheme.dll file in the current working directory, a different vulnerability than CVE-2010-4831.
The weakness was disclosed 09/06/2011 with LAC Co., Ltd (Website). The advisory is shared for download at securityfocus.com. This vulnerability was named CVE-2010-4833 since 09/06/2011. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. There are known technical details, but no exploit is available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 11/18/2021). The MITRE ATT&CK project declares the attack technique as T1574.
Upgrading to version 2.8.9 eliminates this vulnerability.
The vulnerability is also documented in the databases at SecurityFocus (BID 49449†) and Secunia (SA45815†). The entry VDB-58431 is pretty similar. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.8VulDB Meta Temp Score: 9.4
VulDB Base Score: 9.8
VulDB Temp Score: 9.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Untrusted search pathCWE: CWE-426
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: GTK+ 2.8.9
Patch: git.gnome.org
Timeline
09/05/2011 🔍09/06/2011 🔍
09/06/2011 🔍
09/06/2011 🔍
09/09/2011 🔍
03/23/2015 🔍
11/18/2021 🔍
Sources
Advisory: securityfocus.com⛔Organization: LAC Co., Ltd
Status: Not defined
Confirmation: 🔍
CVE: CVE-2010-4833 (🔍)
GCVE (CVE): GCVE-0-2010-4833
GCVE (VulDB): GCVE-100-58432
SecurityFocus: 49449 - GTK+ Multiple DLL Loading Arbitrary Code Execution Vulnerabilities
Secunia: 45815 - GTK+ Insecure Library Loading Vulnerability, Highly Critical
See also: 🔍
Entry
Created: 03/23/2015 16:50Updated: 11/18/2021 15:57
Changes: 03/23/2015 16:50 (50), 01/29/2018 08:01 (7), 11/18/2021 15:52 (3), 11/18/2021 15:57 (2)
Complete: 🔍
Cache ID: 216:039:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.