CVE-2005-3737

Inkscape - Buffer Overflow

Title source: rule
STIX 2.1

Description

Buffer overflow in the SVG importer (style.cpp) of inkscape 0.41 through 0.42.2 might allow remote attackers to execute arbitrary code via a SVG file with long CSS style property values.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Joxean Koret · textremotelinux
https://www.exploit-db.com/exploits/26540

References (13)

Core 13
Core References
Third Party Advisory vendor-advisory x_refsource_gentoo
http://www.gentoo.org/security/en/glsa/glsa-200511-22.xml
Vendor Advisory vendor-advisory x_refsource_suse
http://www.novell.com/linux/security/advisories/2005_28_sr.html
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/17778
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/17651
Various Sources vendor-advisory x_refsource_ubuntu
http://www.ubuntulinux.org/usn/usn-217-1
Exploit, Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/15507
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/17882
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2005/2511
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2005/dsa-916
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/58
Patch, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/17662

Scores

EPSS 0.2806
EPSS Percentile 96.5%

Details

Status published
Products (4)
inkscape/inkscape 0.41
inkscape/inkscape 0.42
inkscape/inkscape 0.42.1
inkscape/inkscape 0.42.2
Published Nov 22, 2005
Tracked Since Feb 18, 2026