Информационная безопасность
[RU] switch to English


Дополнительная информация

  DoS через PNG в libgd

From:MANDRIVA
Date:14 июня 2007 г.
Subject:[Full-disclosure] [ MDKSA-2007:122 ] - Updated gd packages fix vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory                         MDKSA-2007:122
http://www.mandriva.com/security/
_______________________________________________________________________

Package : gd
Date    : June 13, 2007
Affected: 2007.0, 2007.1, Corporate 3.0, Corporate 4.0
_______________________________________________________________________

Problem Description:

A flaw in libgd2 was found by Xavier Roche where it would not correctly
validate PNG callback results.  If an application linked against
libgd2 was tricked into processing a specially-crafted PNG file, it
could cause a denial of service scenario via CPU resource consumption.

The updated packages have been patched to prevent this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.0:
4553247ff29b71630a511cfa2e8f8dae  2007.0/i586/gd-utils-2.0.33-5.2mdv2007.0.i586.rpm
e597fdc7e70f9d47fba809c068d01c73  2007.0/i586/libgd2-2.0.33-5.2mdv2007.0.i586.rpm
5cb1c7417540c8bf923329a1b913e8af  2007.0/i586/libgd2-devel-2.0.33-5.2mdv2007.0.i586.rpm
41c08511d622f73c2941cd6153283a9d  2007.0/i586/libgd2-static-devel-2.0.33-5.2mdv2007.0.i586.rpm
7f26e734f247f081c4f91d88c4cf8746  2007.0/SRPMS/gd-2.0.33-5.2mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
6d49b3c840e14ed18363069c12c94672  2007.0/x86_64/gd-utils-2.0.33-5.2mdv2007.0.x86_64.rpm
4d96a041fa0afcdb46d395c87f545080  2007.0/x86_64/lib64gd2-2.0.33-5.2mdv2007.0.x86_64.rpm
36921632c56a9972f1d6db49e225e5c7  2007.0/x86_64/lib64gd2-devel-2.0.33-5.2mdv2007.0.x86_64.rpm
8d1636c72f97ea7e654fdae03cdee7ce  2007.0/x86_64/lib64gd2-static-devel-2.0.33-5.2mdv2007.0.x86_64.rpm
7f26e734f247f081c4f91d88c4cf8746  2007.0/SRPMS/gd-2.0.33-5.2mdv2007.0.src.rpm

Mandriva Linux 2007.1:
be767d1fb70fadda41e824b60a40654a  2007.1/i586/gd-utils-2.0.34-1.1mdv2007.1.i586.rpm
d2f160f37beadd9ba3d5170e8524e2cd  2007.1/i586/libgd2-2.0.34-1.1mdv2007.1.i586.rpm
364b5cf24157faf590f19f039f67c041  2007.1/i586/libgd2-devel-2.0.34-1.1mdv2007.1.i586.rpm
e87568c973cfae2c65326c95a23841d2  2007.1/i586/libgd2-static-devel-2.0.34-1.1mdv2007.1.i586.rpm
03c9eadb6bdb8ada82180da39b745100  2007.1/SRPMS/gd-2.0.34-1.1mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
39ec275e8946123b78e01671a31ee128  2007.1/x86_64/gd-utils-2.0.34-1.1mdv2007.1.x86_64.rpm
17d51791166f4a15f4cf8fee41852b04  2007.1/x86_64/lib64gd2-2.0.34-1.1mdv2007.1.x86_64.rpm
74195a52b4b4d3de151b720809492aa8  2007.1/x86_64/lib64gd2-devel-2.0.34-1.1mdv2007.1.x86_64.rpm
058ad0e0a91a0d069539b7c235f883a0  2007.1/x86_64/lib64gd2-static-devel-2.0.34-1.1mdv2007.1.x86_64.rpm
03c9eadb6bdb8ada82180da39b745100  2007.1/SRPMS/gd-2.0.34-1.1mdv2007.1.src.rpm

Corporate 3.0:
77415362e06982bdf984f378ac768bd1  corporate/3.0/i586/gd-utils-2.0.15-4.4.C30mdk.i586.rpm
28e9d357648fc4367b8ae481a4ef46f0  corporate/3.0/i586/libgd2-2.0.15-4.4.C30mdk.i586.rpm
ebcac1bb4ac277b8813d2b9f2d4e6ec9  corporate/3.0/i586/libgd2-devel-2.0.15-4.4.C30mdk.i586.rpm
77376cc5884c131906c6977cb9c52e76  corporate/3.0/i586/libgd2-static-devel-2.0.15-4.4.C30mdk.i586.rpm
19787484527e346d55c74459abcbe878  corporate/3.0/SRPMS/gd-2.0.15-4.4.C30mdk.src.rpm

Corporate 3.0/X86_64:
beb3b4d6b05b3bf5d5f26be43b166dc0  corporate/3.0/x86_64/gd-utils-2.0.15-4.4.C30mdk.x86_64.rpm
6f24793bb256074012c76cc678caf17f  corporate/3.0/x86_64/lib64gd2-2.0.15-4.4.C30mdk.x86_64.rpm
d2d43fc0411bbcbdb1c5cd81b5c730fe  corporate/3.0/x86_64/lib64gd2-devel-2.0.15-4.4.C30mdk.x86_64.rpm
78891b53940ad4d50010f3a5d8a9eb74  corporate/3.0/x86_64/lib64gd2-static-devel-2.0.15-4.4.C30mdk.x86_64.rpm
19787484527e346d55c74459abcbe878  corporate/3.0/SRPMS/gd-2.0.15-4.4.C30mdk.src.rpm

Corporate 4.0:
74461c4ac716814c86060d9418f6cf54  corporate/4.0/i586/gd-utils-2.0.33-3.3.20060mlcs4.i586.rpm
2c6101e648d090bfde2a6038042a56ae  corporate/4.0/i586/libgd2-2.0.33-3.3.20060mlcs4.i586.rpm
3beb7a4c7bb978442d3098f852f3e3fc  corporate/4.0/i586/libgd2-devel-2.0.33-3.3.20060mlcs4.i586.rpm
ef4fb906adf0a9d40fab025ca9cf20d4  corporate/4.0/i586/libgd2-static-devel-2.0.33-3.3.20060mlcs4.i586.rpm
febc485fc1fed3d030cf440a20f000ef  corporate/4.0/SRPMS/gd-2.0.33-3.3.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
fc5078a497db8094fbf14980a5ee2c76  corporate/4.0/x86_64/gd-utils-2.0.33-3.3.20060mlcs4.x86_64.rpm
80e1c4bb6338dfb58c246d0a8b001181  corporate/4.0/x86_64/lib64gd2-2.0.33-3.3.20060mlcs4.x86_64.rpm
e3db3d95d3a1485226ae15d5bb5ea6c5  corporate/4.0/x86_64/lib64gd2-devel-2.0.33-3.3.20060mlcs4.x86_64.rpm
00a195e5e03a1a5840f95ddd0b42f7db  corporate/4.0/x86_64/lib64gd2-static-devel-2.0.33-3.3.20060mlcs4.x86_64.rpm
febc485fc1fed3d030cf440a20f000ef  corporate/4.0/SRPMS/gd-2.0.33-3.3.20060mlcs4.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi.  The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security.  You can obtain the
GPG public key of the Mandriva Security Team by executing:

 gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

 http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

 security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID     Date       User ID
pub  1024D/22458A98 2000-07-10 Mandriva Security Team
 <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGcHJ/mqjQ0CJFipgRAqvoAJ9p8p87Pov6M/WinmBuPTWIi9NZCgCgkAEn
I9gFnK9U0WGT+4oBOTOrMVw=
=utH1
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород