![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.58005 |
Category: | Mandrake Local Security Checks |
Title: | Mandrake Security Advisory MDKSA-2007:039 (gtk+2.0) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to gtk+2.0 announced via advisory MDKSA-2007:039. The GdkPixbufLoader function in GIMP ToolKit (GTK+) in GTK 2 (gtk2) allows context-dependent attackers to cause a denial of service (crash) via a malformed image file. (CVE-2007-0010) The version of libgtk+2.0 shipped with Mandriva Linux 2007 fails various portions of the lsb-test-desktop test suite, part of LSB 3.1 certification testing. The updated packages also address the following issues: The Home and Desktop entries in the GTK File Chooser are not always visible (#26644). GTK+-based applications (which includes all the Mandriva Linux configuration tools, for example) crash (instead of falling back to the default theme) when an invalid icon theme is selected. (#27013) Additional patches from GNOME CVS have been included to address the following issues from the GNOME bugzilla: * 357132 - fix RGBA colormap issue * 359537,357280,359052 - fix various printer bugs * 357566,353736,357050,363437,379503 - fix various crashes * 372527 - fix fileselector bug + potential deadlock Affected: 2007.0, Corporate 3.0, Corporate 4.0 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2007:039 http://qa.mandriva.com/show_bug.cgi?id=26644 http://qa.mandriva.com/show_bug.cgi?id=27013 Risk factor : Medium CVSS Score: 2.1 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-0010 1017552 http://securitytracker.com/id?1017552 22209 http://www.securityfocus.com/bid/22209 23884 http://secunia.com/advisories/23884 23933 http://secunia.com/advisories/23933 23935 http://secunia.com/advisories/23935 23984 http://secunia.com/advisories/23984 24006 http://secunia.com/advisories/24006 24010 http://secunia.com/advisories/24010 24095 http://secunia.com/advisories/24095 31621 http://osvdb.org/31621 ADV-2007-0331 http://www.vupen.com/english/advisories/2007/0331 DSA-1256 https://www.debian.org/security/2007/dsa-1256 MDKSA-2007:039 http://www.mandriva.com/security/advisories?name=MDKSA-2007:039 RHSA-2007:0019 http://www.redhat.com/support/errata/RHSA-2007-0019.html SUSE-SR:2007:002 http://www.novell.com/linux/security/advisories/2007_02_sr.html USN-415-1 http://www.ubuntu.com/usn/usn-415-1 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218932 https://issues.rpath.com/browse/RPL-984 oval:org.mitre.oval:def:10325 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10325 |
Copyright | Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |