|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200503-13] mlterm: Integer overflow vulnerability Vulnerability Scan
Vulnerability Scan Summary mlterm: Integer overflow vulnerability
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200503-13
(mlterm: Integer overflow vulnerability)
mlterm is vulnerable to an integer overflow that can be triggered
by specifying a large image file as a background. This only effects
users that have compiled mlterm with the 'gtk' USE flag, which enables
gdk-pixbuf support.
Impact
A possible hacker can create a specially-crafted image file which, when
used as a background by the victim, can lead to the execution of
arbitrary code with the rights of the user running mlterm.
Workaround
Re-compile mlterm without the 'gtk' USE flag.
References:
https://sourceforge.net/project/shownotes.php?release_id=310416
Solution:
All mlterm users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-terms/mlterm-2.9.2"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|