Description: | Description:
The remote host is missing an update to gdk-pixbuf announced via advisory FEDORA-2005-1085.
Update Information:
The gdk-pixbuf package contains an image loading library used with the GNOME GUI desktop environment.
A bug was found in the way gdk-pixbuf processes XPM images. An attacker could create a carefully crafted XPM file in such a way that it could cause an application linked with gdk-pixbuf to execute arbitrary code when the file was opened by a victim. The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-3186 to this issue.
Ludwig Nussel discovered an integer overflow bug in the way gdk-pixbuf processes XPM images. An attacker could create a carefully crafted XPM file in such a way that it could cause an application linked with gdk-pixbuf to execute arbitrary code or crash when the file was opened by a victim. The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-2976 to this issue.
Ludwig Nussel also discovered an infinite-loop denial of service bug in the way gdk-pixbuf processes XPM images. An attacker could create a carefully crafted XPM file in such a way that it could cause an application linked with gdk-pixbuf to stop responding when the file was opened by a victim. The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-2975 to this issue.
Users of gdk-pixbuf are advised to upgrade to these updated packages, which contain backported patches and are not vulnerable to these issues. * Mon Oct 31 2005 Matthias Clasen - 1:0.22.0-18.fc4.2 - Prevent another integer overflow in the xpm loader (#171901, CVE-2005-2976) - Prevent an infinite loop in the xpm loader (#171901, CVE-2005-2976)
* Wed Oct 19 2005 Matthias Clasen - 1:0.22.0-18.fc4.1 - Prevent an integer overflow in the xpm loader (#171073, CVE-2005-3186)
Solution: Apply the appropriate updates.
This update can be downloaded from: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/
This update can also be installed with the Update Agent you can launch the Update Agent with the 'up2date' command.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2005-1085
Risk factor : High
CVSS Score: 7.8
|