Family: Mandrake Local Security Checks --> Category: infos
MDKSA-2006:198-1: imlib2 Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the imlib2 package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory MDKSA-2006:198-1 (imlib2).
M Joonas Pihlaja discovered several vulnerabilities in the Imlib2
The load() function of several of the Imlib2 image loaders does not
check the width and height of an image before allocating memory. As a
result, a carefully crafted image file can trigger a segfault when an
application using Imlib2 attempts to view the image. (CVE-2006-4806)
The tga loader fails to bounds check input data to make sure the input
data doesn't load outside the memory mapped region. (CVE-2006-4807)
The RLE decoding loops of the load() function in the tga loader does
not check that the count byte of an RLE packet doesn't cause a heap
overflow of the pixel buffer. (CVE-2006-4808)
The load() function of the pnm loader writes arbitrary length user data
into a fixed size stack allocated buffer buf without bounds checking.
(CVE-2006-4809) Updated packages have been patched to correct these
An error in the previous patchset may affect JPEG image handling for
certain valid images. This new update corrects this issue.
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:198-1
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.