Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200511-22] Inkscape: Buffer overflow Vulnerability Scan
Vulnerability Scan Summary
Inkscape: Buffer overflow
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200511-22
(Inkscape: Buffer overflow)
Joxean Koret has discovered that Inkscape incorrectly allocates
memory when opening an SVG file, creating the possibility of a buffer
overflow if the SVG file being opened is specially crafted.
A possible hacker could entice a user into opening a maliciously crafted
SVG file, allowing for the execution of arbitrary code on a machine
with the rights of the user running Inkscape.
There is no known workaround at this time.
All Inkscape users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-gfx/inkscape-0.43"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.