|Category:||FreeBSD Local Security Checks|
|Title:||FreeBSD Ports: zgv|
|Summary:||FreeBSD Ports: zgv|
|Description:||The remote host is missing an update to the system|
as announced in the referenced advisory.
The following packages are affected:
Heap-based buffer overflow in zgv before 5.8 and xzgv before 0.8 might
allow user-complicit attackers to execute arbitrary code via a JPEG
image with more than 3 output components, such as a CMYK or YCCK color
space, which causes less memory to be allocated than required.
Update your system with the appropriate patches or
BugTraq ID: 17409|
Common Vulnerability Exposure (CVE) ID: CVE-2006-1060
Debian Security Information: DSA-1037 (Google Search)
Debian Security Information: DSA-1038 (Google Search)
SuSE Security Announcement: SUSE-SR:2006:008 (Google Search)
XForce ISS Database: xzgv-jpeg-bo(25718)
|Copyright||Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com|
|This is only one of 45261 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.