|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2009:0336|
The remote host is missing updates announced in
GLib is the low-level core library that forms the basis for projects such
as GTK+ and GNOME. It provides data structure handling for C, portability
wrappers, and interfaces for such runtime functionality as an event loop,
threads, dynamic loading, and an object system.
Diego Pettenò discovered multiple integer overflows causing heap-based
buffer overflows in GLib's Base64 encoding and decoding functions. An
attacker could use these flaws to crash an application using GLib's Base64
functions to encode or decode large, untrusted inputs, or, possibly,
execute arbitrary code as the user running the application. (CVE-2008-4316)
Note: No application shipped with Red Hat Enterprise Linux 5 uses the
affected functions. Third-party applications may, however, be affected.
All users of glib2 should upgrade to these updated packages, which contain
backported patches to resolve these issues.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Common Vulnerability Exposure (CVE) ID: CVE-2008-4316|
BugTraq ID: 34100
Bugtraq: 20090312 [oCERT-2008-015] glib and glib-predecessor heap overflows (Google Search)
Bugtraq: 20090312 rPSA-2009-0045-1 glib (Google Search)
Debian Security Information: DSA-1747 (Google Search)
SuSE Security Announcement: SUSE-SA:2009:026 (Google Search)
XForce ISS Database: glib-gbase64-bo(49272)
|Copyright||Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.