Login
Newsletter
Werbung

Sicherheit: Zahlenüberläufe in gimp
Aktuelle Meldungen Distributionen
Name: Zahlenüberläufe in gimp
ID: MDKSA-2007:170
Distribution: Mandriva
Plattformen: Mandriva Corporate 3.0, Mandriva 2007.0, Mandriva 2007.1
Datum: Do, 23. August 2007, 21:57
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4519
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2949
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3741
Applikationen: GIMP

Originalnachricht

This is a multi-part message in MIME format...

------------=_1187899028-7034-968


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2007:170
http://www.mandriva.com/security/
_______________________________________________________________________

Package : gimp
Date : August 23, 2007
Affected: 2007.0, 2007.1, Corporate 3.0
_______________________________________________________________________

Problem Description:

Multiple integer overflows in the image loader plug-ins in GIMP before
2.2.16 allow user-assisted remote attackers to execute arbitrary code
via crafted length values in (1) DICOM, (2) PNM, (3) PSD, (4) PSP,
(5) Sun RAS, (6) XBM, and (7) XWD files. (CVE-2006-4519)

Integer overflow in the seek_to_and_unpack_pixeldata function in
the psd.c plugin in Gimp 2.2.15 allows remote attackers to execute
arbitrary code via a crafted PSD file that contains a large (1)
width or (2) height value. (CVE-2007-2949)

Victor Stinner has discovered several flaws in file plug-ins using
his fuzzyfier tool fusil. Several modified image files cause the
plug-ins to crash or consume excessive amounts of memory due to
insufficient input validation. Affected plug-ins: bmp, pcx, psd, psp
(*.tub). (CVE-2007-3741)

Updated packages have been patched to prevent these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4519
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2949
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3741
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.0:
bf9edb14123c54a69c8b767e4ff9b59b
2007.0/i586/gimp-2.3.10-6.4mdv2007.0.i586.rpm
25c09088a30f1ac4a619671f971abd65
2007.0/i586/gimp-python-2.3.10-6.4mdv2007.0.i586.rpm
b406215f9a2fd22d48bd28cd2b7aa5c1
2007.0/i586/libgimp2.0-devel-2.3.10-6.4mdv2007.0.i586.rpm
493176b6d9268753888d5ed88fe82d73
2007.0/i586/libgimp2.0_0-2.3.10-6.4mdv2007.0.i586.rpm
6ff93a240bbed2cb1f2a7d43db465c5b
2007.0/SRPMS/gimp-2.3.10-6.4mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
3b0a82327d1c57c9d92edf2810502cc2
2007.0/x86_64/gimp-2.3.10-6.4mdv2007.0.x86_64.rpm
aa6969a3c734d5233ea1bf918068b655
2007.0/x86_64/gimp-python-2.3.10-6.4mdv2007.0.x86_64.rpm
28086552988cf08d50a2196a5683a893
2007.0/x86_64/lib64gimp2.0-devel-2.3.10-6.4mdv2007.0.x86_64.rpm
f85032c7fe1e839c7dae7f0f4f71b19d
2007.0/x86_64/lib64gimp2.0_0-2.3.10-6.4mdv2007.0.x86_64.rpm
6ff93a240bbed2cb1f2a7d43db465c5b
2007.0/SRPMS/gimp-2.3.10-6.4mdv2007.0.src.rpm

Mandriva Linux 2007.1:
8b2d18fbd2ec2d1d75467c875b51194a
2007.1/i586/gimp-2.3.14-3.3mdv2007.1.i586.rpm
eafdff0cbdfa2c5987083d66aab6acf7
2007.1/i586/gimp-python-2.3.14-3.3mdv2007.1.i586.rpm
0547d89384937df347d4bc0141c4ad58
2007.1/i586/libgimp2.0-devel-2.3.14-3.3mdv2007.1.i586.rpm
efde967b2b2f0600b6f6637c0d234a01
2007.1/i586/libgimp2.0_0-2.3.14-3.3mdv2007.1.i586.rpm
23426e0e7ef3735cb4392aab2631122b
2007.1/SRPMS/gimp-2.3.14-3.3mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
4828d4abf93c14331f7f17be448c2ab8
2007.1/x86_64/gimp-2.3.14-3.3mdv2007.1.x86_64.rpm
07ec9f3807b3732767c56882c5700af7
2007.1/x86_64/gimp-python-2.3.14-3.3mdv2007.1.x86_64.rpm
275cdb72761ed809e21c495bef4aebe7
2007.1/x86_64/lib64gimp2.0-devel-2.3.14-3.3mdv2007.1.x86_64.rpm
bc21d6fe79269a20a4e8cf581ec15e73
2007.1/x86_64/lib64gimp2.0_0-2.3.14-3.3mdv2007.1.x86_64.rpm
23426e0e7ef3735cb4392aab2631122b
2007.1/SRPMS/gimp-2.3.14-3.3mdv2007.1.src.rpm

Corporate 3.0:
0dcdab9693c953ac71ffd48f3df99502
corporate/3.0/i586/gimp-1.2.5-13.4.C30mdk.i586.rpm
c7911c3c8d3cbf6c7c0a996e24fd2f0b
corporate/3.0/i586/gimp-doc-1.2.5-13.4.C30mdk.i586.rpm
106fef8a8de6f8c18acbdfee686acf37
corporate/3.0/i586/gimp-perl-1.2.5-13.4.C30mdk.i586.rpm
d1dfe6d9f1399bffcc6da9a775104312
corporate/3.0/i586/libgimp1.2-1.2.5-13.4.C30mdk.i586.rpm
1d000ff63592903fd2f761d838699fea
corporate/3.0/i586/libgimp1.2_1-1.2.5-13.4.C30mdk.i586.rpm
97b6a130d96da091eb26da1ac54ebcd4
corporate/3.0/i586/libgimp1.2_1-devel-1.2.5-13.4.C30mdk.i586.rpm
df25d5dc833ca512a0d31f839bdf7474
corporate/3.0/SRPMS/gimp-1.2.5-13.4.C30mdk.src.rpm

Corporate 3.0/X86_64:
7d6a3c0448b39a0b3194a73dbf9e5b19
corporate/3.0/x86_64/gimp-1.2.5-13.4.C30mdk.x86_64.rpm
4e243e82b04fdddf71845d04c75595cf
corporate/3.0/x86_64/gimp-doc-1.2.5-13.4.C30mdk.x86_64.rpm
ac826ac35fe04e0bc591cb4612cbe30d
corporate/3.0/x86_64/gimp-perl-1.2.5-13.4.C30mdk.x86_64.rpm
c9d1fb6e82830ce6502ec1cc56a99b43
corporate/3.0/x86_64/lib64gimp1.2-1.2.5-13.4.C30mdk.x86_64.rpm
3ab4ea172a56d2e4d85025e65c8fdd91
corporate/3.0/x86_64/lib64gimp1.2_1-1.2.5-13.4.C30mdk.x86_64.rpm
bb3d1d4b0bd1519bc452e08bae9b23a5
corporate/3.0/x86_64/lib64gimp1.2_1-devel-1.2.5-13.4.C30mdk.x86_64.rpm
df25d5dc833ca512a0d31f839bdf7474
corporate/3.0/SRPMS/gimp-1.2.5-13.4.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGzdBSmqjQ0CJFipgRAov9AJ97s+YuHubKQ2Mu+3MqR0iNPkyE2QCfZ5jA
qBuvkLdx9WClGwVKEg80Vuw=
=gKiG
-----END PGP SIGNATURE-----


------------=_1187899028-7034-968
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1187899028-7034-968--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung