Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.64160
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-683-1 (imlib2)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to imlib2
announced via advisory USN-683-1.

Details follow:

It was discovered that Imlib2 did not correctly handle certain malformed
XPM images. If a user were tricked into opening a specially crafted image
with an application that uses Imlib2, an attacker could cause a denial of
service and possibly execute arbitrary code with the user's privileges.

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
libimlib2 1.2.1-2ubuntu0.3

Ubuntu 7.10:
libimlib2 1.3.0.0debian1-4ubuntu0.1

Ubuntu 8.04 LTS:
libimlib2 1.4.0-1ubuntu1.1

Ubuntu 8.10:
libimlib2 1.4.0-1.1ubuntu1.1

After a standard system upgrade you need to restart any applications that
use Imlib2 to effect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-683-1

Risk factor : High

CVSS Score:
7.5

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-5187
BugTraq ID: 32371
http://www.securityfocus.com/bid/32371
Debian Security Information: DSA-1672 (Google Search)
http://www.debian.org/security/2008/dsa-1672
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00856.html
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00858.html
http://security.gentoo.org/glsa/glsa-200812-23.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:019
http://www.openwall.com/lists/oss-security/2008/11/20/5
http://osvdb.org/49970
http://secunia.com/advisories/32796
http://secunia.com/advisories/32843
http://secunia.com/advisories/32949
http://secunia.com/advisories/32963
http://secunia.com/advisories/33323
http://secunia.com/advisories/33568
SuSE Security Announcement: SUSE-SR:2009:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
http://www.ubuntu.com/usn/USN-683-1
http://www.vupen.com/english/advisories/2008/3212
Common Vulnerability Exposure (CVE) ID: CVE-2008-5286
BugTraq ID: 32518
http://www.securityfocus.com/bid/32518
Debian Security Information: DSA-1677 (Google Search)
http://www.debian.org/security/2008/dsa-1677
http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml
http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:028
http://www.mandriva.com/security/advisories?name=MDVSA-2009:029
http://www.openwall.com/lists/oss-security/2008/12/01/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058
http://www.redhat.com/support/errata/RHSA-2008-1028.html
http://www.securitytracker.com/id?1021298
http://secunia.com/advisories/32962
http://secunia.com/advisories/33101
http://secunia.com/advisories/33111
http://www.vupen.com/english/advisories/2008/3315
XForce ISS Database: cups-cupsimagereadpng-overflow(46933)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46933
Common Vulnerability Exposure (CVE) ID: CVE-2008-4917
BugTraq ID: 32597
http://www.securityfocus.com/bid/32597
Bugtraq: 20081203 Re: VMSA-2008-0019 VMware Hosted products and patches for ESX and ESXi resolve a critical security issue and update bzip2 (Google Search)
http://www.securityfocus.com/archive/1/498886/100/0/threaded
Bugtraq: 20081203 VMSA-2008-0019 VMware Hosted products and patches for ESX and ESXi resolve a critical security issue and update bzip2 (Google Search)
http://www.securityfocus.com/archive/1/498863/100/0/threaded
http://security.gentoo.org/glsa/glsa-201209-25.xml
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6246
http://securitytracker.com/id?1021300
http://securitytracker.com/id?1021301
http://secunia.com/advisories/32965
Common Vulnerability Exposure (CVE) ID: CVE-2008-1372
http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html
BugTraq ID: 28286
http://www.securityfocus.com/bid/28286
Bugtraq: 20080321 rPSA-2008-0118-1 bzip2 (Google Search)
http://www.securityfocus.com/archive/1/489968/100/0/threaded
Cert/CC Advisory: TA09-218A
http://www.us-cert.gov/cas/techalerts/TA09-218A.html
CERT/CC vulnerability note: VU#813451
http://www.kb.cert.org/vuls/id/813451
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00165.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00225.html
http://www.gentoo.org/security/en/glsa/glsa-200804-02.xml
http://security.gentoo.org/glsa/glsa-200903-40.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:075
http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html
http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/
NETBSD Security Advisory: NetBSD-SA2008-004
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-004.txt.asc
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10067
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6467
http://www.redhat.com/support/errata/RHSA-2008-0893.html
http://www.securitytracker.com/id?1020867
http://secunia.com/advisories/29410
http://secunia.com/advisories/29475
http://secunia.com/advisories/29497
http://secunia.com/advisories/29506
http://secunia.com/advisories/29656
http://secunia.com/advisories/29677
http://secunia.com/advisories/29698
http://secunia.com/advisories/29940
http://secunia.com/advisories/31204
http://secunia.com/advisories/31869
http://secunia.com/advisories/31878
http://secunia.com/advisories/36096
http://www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.473263
http://sunsolve.sun.com/search/document.do?assetkey=1-26-241786-1
SuSE Security Announcement: SUSE-SR:2008:011 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html
https://usn.ubuntu.com/590-1/
http://www.vupen.com/english/advisories/2008/0915
http://www.vupen.com/english/advisories/2008/2557
http://www.vupen.com/english/advisories/2009/2172
XForce ISS Database: bzip2-archives-code-execution(41249)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41249
Common Vulnerability Exposure (CVE) ID: CVE-2008-5302
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
Bugtraq: 20090120 rPSA-2009-0011-1 perl (Google Search)
http://www.securityfocus.com/archive/1/500210/100/0/threaded
Debian Security Information: DSA-1678 (Google Search)
http://www.debian.org/security/2008/dsa-1678
http://www.mandriva.com/security/advisories?name=MDVSA-2010:116
http://www.gossamer-threads.com/lists/perl/porters/233695#233695
http://www.openwall.com/lists/oss-security/2008/11/28/2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11076
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6890
http://www.redhat.com/support/errata/RHSA-2010-0458.html
http://secunia.com/advisories/32980
http://secunia.com/advisories/33314
http://secunia.com/advisories/40052
SuSE Security Announcement: SUSE-SR:2009:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
http://www.ubuntu.com/usn/usn-700-1
http://www.ubuntu.com/usn/usn-700-2
XForce ISS Database: perl-filepath-symlink(47043)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47043
Common Vulnerability Exposure (CVE) ID: CVE-2008-5303
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6680
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9699
XForce ISS Database: filepath-rmtree-symlink(47044)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47044
Common Vulnerability Exposure (CVE) ID: CVE-2005-0448
BugTraq ID: 12767
http://www.securityfocus.com/bid/12767
Conectiva Linux advisory: CLSA-2006:1056
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056
Debian Security Information: DSA-696 (Google Search)
http://www.debian.org/security/2005/dsa-696
http://fedoranews.org/updates/FEDORA--.shtml
http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml
HPdes Security Advisory: HPSBUX01208
http://www.securityfocus.com/advisories/8704
HPdes Security Advisory: SSRT5938
http://www.mandriva.com/security/advisories?name=MDKSA-2005:079
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10475
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A728
http://www.redhat.com/support/errata/RHSA-2005-674.html
http://www.redhat.com/support/errata/RHSA-2005-881.html
http://secunia.com/advisories/14531
http://secunia.com/advisories/17079
http://secunia.com/advisories/18075
http://secunia.com/advisories/18517
http://secunia.com/advisories/55314
SGI Security Advisory: 20060101-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
https://usn.ubuntu.com/94-1/
Common Vulnerability Exposure (CVE) ID: CVE-2004-0452
BugTraq ID: 12072
http://www.securityfocus.com/bid/12072
Bugtraq: 20050111 [OpenPKG-SA-2005.001] OpenPKG Security Advisory (perl) (Google Search)
http://marc.info/?l=bugtraq&m=110547693019788&w=2
Debian Security Information: DSA-620 (Google Search)
http://www.debian.org/security/2004/dsa-620
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9938
http://www.redhat.com/support/errata/RHSA-2005-103.html
http://www.redhat.com/support/errata/RHSA-2005-105.html
http://secunia.com/advisories/12991
https://www.ubuntu.com/usn/usn-44-1/
XForce ISS Database: perl-filepathrmtree-insecure-permissions(18650)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18650
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.