Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200507-28] AMD64 x86 emulation base libraries: Buffer overflow Vulnerability Scan
Vulnerability Scan Summary
AMD64 x86 emulation base libraries: Buffer overflow
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200507-28
(AMD64 x86 emulation base libraries: Buffer overflow)
Earlier versions of emul-linux-x86-baselibs contain a vulnerable
version of zlib, which may lead to a buffer overflow.
By creating a specially crafted compressed data stream, attackers
can overwrite data structures for applications that use the x86
emulation base libraries for AMD64, resulting in a Denial of Service
and potentially arbitrary code execution.
There is no known workaround at this time.
All AMD64 x86 emulation base libraries users should upgrade to the
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-baselibs-2.2"
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.