[ GLSA 200511-03 ] giflib: Multiple vulnerabilities

From: Thierry Carrez (koon_at_gentoo.org)
Date: 11/04/05

  • Next message: kfinisterre: "DMA[2005-1104a] - 'GpsDrive friendsd2 format string vulnerability'"
    Date: Fri, 04 Nov 2005 13:19:35 +0100
    To: gentoo-announce@lists.gentoo.org
    
    
    

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 200511-03
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                                http://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

      Severity: Normal
         Title: giflib: Multiple vulnerabilities
          Date: November 04, 2005
          Bugs: #109997
            ID: 200511-03

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    giflib may dereference NULL or write out of bounds when processing
    malformed images, potentially resulting in Denial of Service or
    arbitrary code execution.

    Background
    ==========

    giflib is a library for reading and writing GIF images.

    Affected packages
    =================

        -------------------------------------------------------------------
         Package / Vulnerable / Unaffected
        -------------------------------------------------------------------
      1 media-libs/giflib < 4.1.4 >= 4.1.4

    Description
    ===========

    Chris Evans and Daniel Eisenbud independently discovered two
    out-of-bounds memory write operations and a NULL pointer dereference in
    giflib.

    Impact
    ======

    An attacker could craft a malicious GIF image and entice users to load
    it using an application making use of the giflib library, resulting in
    an application crash or potentially the execution of arbitrary code.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All giflib users should upgrade to the latest version:

        # emerge --sync
        # emerge --ask --oneshot --verbose ">=media-libs/giflib-4.1.4"

    References
    ==========

      [ 1 ] CVE-2005-2974
            http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2974
      [ 2 ] CVE-2005-3350
            http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3350

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

      http://security.gentoo.org/glsa/glsa-200511-03.xml

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users machines is of utmost
    importance to us. Any security concerns should be addressed to
    security@gentoo.org or alternatively, you may file a bug at
    http://bugs.gentoo.org.

    License
    =======

    Copyright 2005 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    http://creativecommons.org/licenses/by-sa/2.0

    
    



  • Next message: kfinisterre: "DMA[2005-1104a] - 'GpsDrive friendsd2 format string vulnerability'"