Description: | Description:
The remote host is missing an update to gdk-pixbuf announced via advisory FEDORA-2004-287.
During testing of a previously fixed flaw in Qt (CVE-2004-0691), a flaw was discovered in the BMP image processor of gdk-pixbuf. An attacker could create a carefully crafted BMP file which would cause an application to enter an infinite loop and not respond to user input when the file was opened by a victim. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0753 to this issue.
During a security audit, Chris Evans discovered a stack and a heap overflow in the XPM image decoder. An attacker could create a carefully crafted XPM file which could cause an application linked with gtk2 to crash or possibly execute arbitrary code when the file was opened by a victim. (CVE-2004-0782, CVE-2004-0783)
Chris Evans also discovered an integer overflow in the ICO image decoder. An attacker could create a carefully crafted ICO file which could cause an application linked with gtk2 to crash when the file is opened by a victim. (CVE-2004-0788)
This update can be downloaded from: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/
df423014919ec5696f889ac6f4787746 SRPMS/gdk-pixbuf-0.22.0-11.2.3.src.rpm b0c43651dc3ce287199500dfcc2f0587 x86_64/gdk-pixbuf-0.22.0-11.2.3.x86_64.rpm 7e7fc5ed5415290c782869c4b4891cbf x86_64/gdk-pixbuf-devel-0.22.0-11.2.3.x86_64.rpm 144f31eb04ea373b7e03c7c0478956e9 x86_64/gdk-pixbuf-gnome-0.22.0-11.2.3.x86_64.rpm 3eab7a99d72773cc58f9ae76020170d7 x86_64/debug/gdk-pixbuf-debuginfo-0.22.0-11.2.3.x86_64.rpm 7191295371d1375fa214aae40ed552ad i386/gdk-pixbuf-0.22.0-11.2.3.i386.rpm 1312362346782b79454397d5116c3401 i386/gdk-pixbuf-devel-0.22.0-11.2.3.i386.rpm 26640728f906fbc08f11302aea0c551d i386/gdk-pixbuf-gnome-0.22.0-11.2.3.i386.rpm 5e6d6f574976df72d29a33e19e178aaa i386/debug/gdk-pixbuf-debuginfo-0.22.0-11.2.3.i386.rpm
This update can also be installed with the Update Agent you can launch the Update Agent with the 'up2date' command.
Solution: Apply the appropriate updates. http://www.fedoranews.org/updates/FEDORA-2004-287.shtml
Risk factor : High
CVSS Score: 7.5
|