Integer overflow in the load_iface function in Tools/gdomap.c in gdomap in GNUstep Base before 1.20.0 might allow context-dependent attackers to execute arbitrary code via a (1) file or (2) socket that provides configuration data with many entries, leading to a heap-based buffer overflow.
http://secunia.com/advisories/39746
http://savannah.gnu.org/bugs/?29755
http://marc.info/?l=oss-security&m=127325778527537&w=2
http://marc.info/?l=oss-security&m=127324274005709&w=2
http://ftpmain.gnustep.org/pub/gnustep/core/gnustep-base-1.20.0.tar.gz