|
Family: Red Hat Local Security Checks --> Category: infos
RHSA-2005-332: xloadimage Vulnerability Scan
Vulnerability Scan Summary Check for the version of the xloadimage packages
Detailed Explanation for this Vulnerability Test
A new xloadimage package that fixes bugs in handling malformed tiff
and pbm/pnm/ppm images, and in handling metacharacters in filenames is now
available.
This update has been rated as having low security impact by the
Red Hat Security Response Team.
The xloadimage utility displays images in an X Window System window,
loads images into the root window, or writes images into a file.
Xloadimage supports many image types (including GIF, TIFF, JPEG, XPM,
and XBM).
A flaw was discovered in xloadimage where filenames were not properly
quoted when calling the gunzip command. A possible hacker could create a file
with a carefully crafted filename so that it would execute arbitrary
commands if opened by a victim. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2005-0638 to
this issue.
Another bug in xloadimage would cause it to crash if called with certain
invalid TIFF, PNM, PBM, or PPM file names.
All users of xloadimage should upgrade to this erratum package which
contains backported patches to correct these issues.
Solution : http://rhn.redhat.com/errata/RHSA-2005-332.html
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|