|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200511-03] giflib: Multiple vulnerabilities Vulnerability Scan
Vulnerability Scan Summary giflib: Multiple vulnerabilities
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200511-03
(giflib: Multiple vulnerabilities)
Chris Evans and Daniel Eisenbud independently discovered two
out-of-bounds memory write operations and a NULL pointer dereference in
giflib.
Impact
A possible hacker could craft a malicious GIF image and entice users to
load it using an application making use of the giflib library,
resulting in an application crash or potentially the execution of
arbitrary code.
Workaround
There is no known workaround at this time.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2974
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3350
Solution:
All giflib users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/giflib-4.1.4"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|