Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:13354
HistoryJun 28, 2006 - 12:00 a.m.

[Full-disclosure] [ MDKSA-2006:114 ] - Updated libwmf packages fixes embedded GD vulnerability

2006-06-2800:00:00
vulners.com
17

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Mandriva Linux Security Advisory MDKSA-2006:114
http://www.mandriva.com/security/


Package : libwmf
Date : June 27, 2006
Affected: 10.2, 2006.0, Corporate 3.0


Problem Description:

Integer overflows were reported in the GD Graphics Library (libgd)
2.0.28, and possibly other versions. These overflows allow remote
attackers to cause a denial of service and possibly execute arbitrary
code via PNG image files with large image rows values that lead to a
heap-based buffer overflow in the gdImageCreateFromPngCtx() function.
Libwmf contains an embedded copy of the GD library code. (CAN-2004-0941)

Updated packages have been patched to address this issue.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0941


Updated Packages:

Mandriva Linux 10.2:
a4d46429327d699b7301cc6485312245 10.2/RPMS/libwmf0.2_7-0.2.8.3-3.1.102mdk.i586.rpm
1f84aa6e3e71b14a200bdfa44a91826a 10.2/RPMS/libwmf0.2_7-devel-0.2.8.3-3.1.102mdk.i586.rpm
b4a0ed12dde2994b69e1ef9a23d9e1ac 10.2/RPMS/libwmf-0.2.8.3-3.1.102mdk.i586.rpm
3ccfd5a159c7e60865f52120c7c5f1da 10.2/SRPMS/libwmf-0.2.8.3-3.1.102mdk.src.rpm

Mandriva Linux 10.2/X86_64:
782879e047c0d37b5a357d8035c83725 x86_64/10.2/RPMS/lib64wmf0.2_7-0.2.8.3-3.1.102mdk.x86_64.rpm
a95400d8892bdde022d5377c12a03b88 x86_64/10.2/RPMS/lib64wmf0.2_7-devel-0.2.8.3-3.1.102mdk.x86_64.rpm
cf0e7e9313dca9b7c60450e0c27a833d x86_64/10.2/RPMS/libwmf-0.2.8.3-3.1.102mdk.x86_64.rpm
3ccfd5a159c7e60865f52120c7c5f1da x86_64/10.2/SRPMS/libwmf-0.2.8.3-3.1.102mdk.src.rpm

Mandriva Linux 2006.0:
2a772e03ab72f8dd54992d04a96c1885 2006.0/RPMS/libwmf0.2_7-0.2.8.3-6.1.20060mdk.i586.rpm
7d50872c944402fd91989e980954ebcb 2006.0/RPMS/libwmf0.2_7-devel-0.2.8.3-6.1.20060mdk.i586.rpm
8cf37a2c7870b685a8947658f8f334c6 2006.0/RPMS/libwmf-0.2.8.3-6.1.20060mdk.i586.rpm
acc2ce388ca2ad8d216eb053bb50026e 2006.0/SRPMS/libwmf-0.2.8.3-6.1.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
9e2f8d5debbc0812bbf7a4500347d6d1 x86_64/2006.0/RPMS/lib64wmf0.2_7-0.2.8.3-6.1.20060mdk.x86_64.rpm
2a99ea18ab0001a0b16758c695196f8a
x86_64/2006.0/RPMS/lib64wmf0.2_7-devel-0.2.8.3-6.1.20060mdk.x86_64.rpm
851f2f90fabe3fdc378acb9df945e6fa x86_64/2006.0/RPMS/libwmf-0.2.8.3-6.1.20060mdk.x86_64.rpm
acc2ce388ca2ad8d216eb053bb50026e x86_64/2006.0/SRPMS/libwmf-0.2.8.3-6.1.20060mdk.src.rpm

Corporate 3.0:
999fc5dc28a1a4a3dcd6c7b4ffc03aef corporate/3.0/RPMS/libwmf0.2_7-0.2.8-6.1.C30mdk.i586.rpm
c86a9eca5bc2e07d1bbf2bb9845d616f corporate/3.0/RPMS/libwmf0.2_7-devel-0.2.8-6.1.C30mdk.i586.rpm
0e37740131031db95662a1940ed30674 corporate/3.0/RPMS/libwmf-0.2.8-6.1.C30mdk.i586.rpm
957ff53807b795ab37d111339fdcc2cf corporate/3.0/SRPMS/libwmf-0.2.8-6.1.C30mdk.src.rpm

Corporate 3.0/X86_64:
3249f99af56947673ec1d2fcc41233aa x86_64/corporate/3.0/RPMS/lib64wmf0.2_7-0.2.8-6.1.C30mdk.x86_64.rpm
a931c5b073f2bb241eb203bbb1800ab2
x86_64/corporate/3.0/RPMS/lib64wmf0.2_7-devel-0.2.8-6.1.C30mdk.x86_64.rpm
10e051da7f7bf609037fc03e5a1fee5b x86_64/corporate/3.0/RPMS/libwmf-0.2.8-6.1.C30mdk.x86_64.rpm
957ff53807b795ab37d111339fdcc2cf x86_64/corporate/3.0/SRPMS/libwmf-0.2.8-6.1.C30mdk.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEoc+hmqjQ0CJFipgRAlWzAJ4xRQMppOUE8+hsyw+5DBCKjVRS7ACg0bPS
LYJwkDrl+YJAOl3C3H/bmyU=
=wNnk
-----END PGP SIGNATURE-----


Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Related for SECURITYVULNS:DOC:13354