|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200410-09] LessTif: Integer and stack overflows in libXpm Vulnerability Scan
Vulnerability Scan Summary LessTif: Integer and stack overflows in libXpm
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200410-09
(LessTif: Integer and stack overflows in libXpm)
Chris Evans has discovered various integer and stack overflows in libXpm,
which is shipped as a part of the X Window System. LessTif, an application
that includes this library, is susceptible to the same issues.
Impact
A carefully-crafted XPM file could crash applications that are linked
against libXpm, such as LessTif, potentially allowing the execution of
arbitrary code with the rights of the user running the application.
Workaround
There is no known workaround at this time.
References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0687
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0688
http://www.gentoo.org/security/en/glsa/glsa-200409-34.xml
http://www.lesstif.org/ReleaseNotes.html
Solution:
All LessTif users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=x11-libs/lesstif-0.93.97"
# emerge ">=x11-libs/lesstif-0.93.97"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|