The remote host is missing updates announced in
advisory GLSA 200607-06.
A buffer overflow has been found in the libpng library that could lead to
the execution of arbitrary code.
Solution:
All libpng users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=media-libs/libpng-1.2.12'
All AMD64 emul-linux-x86-baselibs users should also upgrade to the latest
version:
# emerge --sync
# emerge --ask --oneshot --verbose
'>=app-emulation/emul-linux-x86-baselibs-2.5.1'
http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200607-06
http://bugs.gentoo.org/show_bug.cgi?id=138433
http://bugs.gentoo.org/show_bug.cgi?id=138672
http://heanet.dl.sourceforge.net/sourceforge/libpng/libpng-1.2.12-README.txt
Risk factor : Medium
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-3334
http://security.gentoo.org/glsa/glsa-200607-06.xml
SuSE Security Announcement: SUSE-SR:2006:016 (Google Search)
http://www.novell.com/linux/security/advisories/2006_16_sr.html
BugTraq ID: 18698
http://www.securityfocus.com/bid/18698
http://www.frsirt.com/english/advisories/2006/2585
XForce ISS Database: libpng-pngdecompresschunk-bo(27468)
http://xforce.iss.net/xforce/xfdb/27468
Fuente: www.securityspace.com
Search for in Google by Dino
sábado, 17 de febrero de 2007
Gentoo Security Advisory GLSA 200607-06 (libpng)
Publicado por http://hackinganddefense.blogspot.com/ Etiquetas: SEGURIDAD INFORMATICA en 10:11 p.m.
Suscribirse a:
Comentarios de la entrada (Atom)
No hay comentarios.:
Publicar un comentario