The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[ MDKSA-2007:036 ] - Updated libwmf packages fix embedded gd DoS vulnerability.


<< Previous INDEX Search src / Print Next >>
To: bugtraq@securityfocus.com
Subject: [ MDKSA-2007:036 ] - Updated libwmf packages fix embedded gd DoS vulnerability.
Date: Tue, 06 Feb 2007 19:10:47 -0700
From: security@mandriva.com
Reply-To: <xsecurity@mandriva.com.>
Message-Id: <E1HEcGl-0004C6-3k@artemis.annvix.ca.>
Sender: QA Team <qateam@artemis.annvix.ca.>
X-Virus-Scanned: antivirus-gw at tyumen.ru


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:036
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : libwmf
 Date    : February 6, 2007
 Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0
 _______________________________________________________________________
 
 Problem Description:
 
 Buffer overflow in the gdImageStringFTEx function in gdft.c in the GD
 Graphics Library 2.0.33 and earlier allows remote attackers to cause a
 denial of service (application crash) and possibly execute arbitrary
 code via a crafted string with a JIS encoded font.

 Libwmf uses an embedded copy of the gd source and may also be affected
 by this issue.

 Packages have been patched to correct this issue.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 e20256e67b230fb391ecc25b462eeab2  2006.0/i586/libwmf-0.2.8.3-6.4.20060mdk.i586.rpm
 d0d0c26789f2e17e5b86cf4ecb4e0f38  2006.0/i586/libwmf0.2_7-0.2.8.3-6.4.20060mdk.i586.rpm
 ed27e474fc154203677111795fbb8d55  2006.0/i586/libwmf0.2_7-devel-0.2.8.3-6.4.20060mdk.i586.rpm 
 1e51660d73213b67ba80967c945d0d49  2006.0/SRPMS/libwmf-0.2.8.3-6.4.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 d2fbbdf43ce91c6d347e381be6b81d74  2006.0/x86_64/lib64wmf0.2_7-0.2.8.3-6.4.20060mdk.x86_64.rpm
 c4f2e16dd585c2d3d3418e965baf4f7f  2006.0/x86_64/lib64wmf0.2_7-devel-0.2.8.3-6.4.20060mdk.x86_64.rpm
 ec618bd5ddaf3abf11736ba6f7bb312e  2006.0/x86_64/libwmf-0.2.8.3-6.4.20060mdk.x86_64.rpm 
 1e51660d73213b67ba80967c945d0d49  2006.0/SRPMS/libwmf-0.2.8.3-6.4.20060mdk.src.rpm

 Mandriva Linux 2007.0:
 6ddcf6fa9d07430b6506c6e539750490  2007.0/i586/libwmf-0.2.8.4-6.1mdv2007.0.i586.rpm
 bca845804d4da48c5945a558d88991ba  2007.0/i586/libwmf0.2_7-0.2.8.4-6.1mdv2007.0.i586.rpm
 e88b4e66f7ba43445578922a77c0af0a  2007.0/i586/libwmf0.2_7-devel-0.2.8.4-6.1mdv2007.0.i586.rpm 
 b6fc7246891a9635e260061666f8d1bc  2007.0/SRPMS/libwmf-0.2.8.4-6.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 9b6632e5918d5984abc3cdc1c3659e47  2007.0/x86_64/lib64wmf0.2_7-0.2.8.4-6.1mdv2007.0.x86_64.rpm
 476cae147f1eefc4cff0d328cc235cfb  2007.0/x86_64/lib64wmf0.2_7-devel-0.2.8.4-6.1mdv2007.0.x86_64.rpm
 b16363e12139fc6786d22a6cfc549bab  2007.0/x86_64/libwmf-0.2.8.4-6.1mdv2007.0.x86_64.rpm 
 b6fc7246891a9635e260061666f8d1bc  2007.0/SRPMS/libwmf-0.2.8.4-6.1mdv2007.0.src.rpm

 Corporate 3.0:
 8ab58c9932da307fc45301d4c43952d0  corporate/3.0/i586/libwmf-0.2.8-6.4.C30mdk.i586.rpm
 8e7d0ab58e3c307b6bb723545d378d1d  corporate/3.0/i586/libwmf0.2_7-0.2.8-6.4.C30mdk.i586.rpm
 c82ea507536b900652218a7ab9d3d69c  corporate/3.0/i586/libwmf0.2_7-devel-0.2.8-6.4.C30mdk.i586.rpm 
 e390b914857d4d67bdb2ef45545a82fd  corporate/3.0/SRPMS/libwmf-0.2.8-6.4.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 ef2f38e688ac821550a8cef7e5ccc48e  corporate/3.0/x86_64/lib64wmf0.2_7-0.2.8-6.4.C30mdk.x86_64.rpm
 440c29e0dac1fd3e980c270e18f53f0f  corporate/3.0/x86_64/lib64wmf0.2_7-devel-0.2.8-6.4.C30mdk.x86_64.rpm
 3125547bd6cdc7eb6fde1a768d9ce771  corporate/3.0/x86_64/libwmf-0.2.8-6.4.C30mdk.x86_64.rpm 
 e390b914857d4d67bdb2ef45545a82fd  corporate/3.0/SRPMS/libwmf-0.2.8-6.4.C30mdk.src.rpm

 Corporate 4.0:
 01ea7b987e96e79f3246cec473e44415  corporate/4.0/i586/libwmf-0.2.8.3-6.4.20060mlcs4.i586.rpm
 82a459c50db3e1042eb489d13c036871  corporate/4.0/i586/libwmf0.2_7-0.2.8.3-6.4.20060mlcs4.i586.rpm
 aef7018051548a36066c65ef59de1571  corporate/4.0/i586/libwmf0.2_7-devel-0.2.8.3-6.4.20060mlcs4.i586.rpm 
 5a04c278fdcb28320aac0cc08e802f14  corporate/4.0/SRPMS/libwmf-0.2.8.3-6.4.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 32bf6a4902c45c2d18de1a025f6cadcc  corporate/4.0/x86_64/lib64wmf0.2_7-0.2.8.3-6.4.20060mlcs4.x86_64.rpm
 db7d2b330c682d23bff9dd852bd6a7ef  corporate/4.0/x86_64/lib64wmf0.2_7-devel-0.2.8.3-6.4.20060mlcs4.x86_64.rpm
 ffb6e68cde364f02cf11f15889fca672  corporate/4.0/x86_64/libwmf-0.2.8.3-6.4.20060mlcs4.x86_64.rpm 
 5a04c278fdcb28320aac0cc08e802f14  corporate/4.0/SRPMS/libwmf-0.2.8.3-6.4.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFyQrxmqjQ0CJFipgRAn1UAKDpxhPL1RgGki/6N/GnV/CbKwG8gwCffsxo
lJ7jUiiRG6SdJt1zH7neN6M=
=rEgb
-----END PGP SIGNATURE-----



<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру