Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.703378 |
Categoría: | Debian Local Security Checks |
Título: | Debian Security Advisory DSA 3378-1 (gdk-pixbuf - security update) |
Resumen: | Several vulnerabilities have;been discovered in gdk-pixbuf, a toolkit for image loading and pixel buffer;manipulation. The Common Vulnerabilities and Exposures project identifies the;following problems:;;CVE-2015-7673;Gustavo Grieco discovered a heap overflow in the processing of TGA;images which may result in the execution of arbitrary code or denial;of service (process crash) if a malformed image is opened.;;CVE-2015-7674;Gustavo Grieco discovered an integer overflow flaw in the processing;of GIF images which may result in the execution of arbitrary code or;denial of service (process crash) if a malformed image is opened. |
Descripción: | Summary: Several vulnerabilities have been discovered in gdk-pixbuf, a toolkit for image loading and pixel buffer manipulation. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2015-7673 Gustavo Grieco discovered a heap overflow in the processing of TGA images which may result in the execution of arbitrary code or denial of service (process crash) if a malformed image is opened. CVE-2015-7674 Gustavo Grieco discovered an integer overflow flaw in the processing of GIF images which may result in the execution of arbitrary code or denial of service (process crash) if a malformed image is opened. Affected Software/OS: gdk-pixbuf on Debian Linux Solution: For the oldstable distribution (wheezy), these problems have been fixed in version 2.26.1-1+deb7u2. For the stable distribution (jessie), these problems have been fixed in version 2.31.1-2+deb8u3. For the testing distribution (stretch), these problems have been fixed in version 2.32.1-1 or earlier. For the unstable distribution (sid), these problems have been fixed in version 2.32.1-1 or earlier. We recommend that you upgrade your gdk-pixbuf packages. CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-7673 BugTraq ID: 76953 http://www.securityfocus.com/bid/76953 Debian Security Information: DSA-3378 (Google Search) http://www.debian.org/security/2015/dsa-3378 https://security.gentoo.org/glsa/201512-05 http://www.openwall.com/lists/oss-security/2015/10/01/3 http://www.openwall.com/lists/oss-security/2015/10/02/9 SuSE Security Announcement: openSUSE-SU-2016:0897 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html SuSE Security Announcement: openSUSE-SU-2016:1467 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html http://www.ubuntu.com/usn/USN-2767-1 Common Vulnerability Exposure (CVE) ID: CVE-2015-7674 BugTraq ID: 76955 http://www.securityfocus.com/bid/76955 http://www.openwall.com/lists/oss-security/2015/10/01/4 http://www.openwall.com/lists/oss-security/2015/10/01/7 http://www.openwall.com/lists/oss-security/2015/10/02/10 http://www.openwall.com/lists/oss-security/2015/10/05/7 |
Copyright | Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |