lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 06 Feb 2007 19:10:47 -0700
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDKSA-2007:036 ] - Updated libwmf packages fix
	embedded gd DoS vulnerability.


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:036
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : libwmf
 Date    : February 6, 2007
 Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0
 _______________________________________________________________________
 
 Problem Description:
 
 Buffer overflow in the gdImageStringFTEx function in gdft.c in the GD
 Graphics Library 2.0.33 and earlier allows remote attackers to cause a
 denial of service (application crash) and possibly execute arbitrary
 code via a crafted string with a JIS encoded font.

 Libwmf uses an embedded copy of the gd source and may also be affected
 by this issue.

 Packages have been patched to correct this issue.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 e20256e67b230fb391ecc25b462eeab2  2006.0/i586/libwmf-0.2.8.3-6.4.20060mdk.i586.rpm
 d0d0c26789f2e17e5b86cf4ecb4e0f38  2006.0/i586/libwmf0.2_7-0.2.8.3-6.4.20060mdk.i586.rpm
 ed27e474fc154203677111795fbb8d55  2006.0/i586/libwmf0.2_7-devel-0.2.8.3-6.4.20060mdk.i586.rpm 
 1e51660d73213b67ba80967c945d0d49  2006.0/SRPMS/libwmf-0.2.8.3-6.4.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 d2fbbdf43ce91c6d347e381be6b81d74  2006.0/x86_64/lib64wmf0.2_7-0.2.8.3-6.4.20060mdk.x86_64.rpm
 c4f2e16dd585c2d3d3418e965baf4f7f  2006.0/x86_64/lib64wmf0.2_7-devel-0.2.8.3-6.4.20060mdk.x86_64.rpm
 ec618bd5ddaf3abf11736ba6f7bb312e  2006.0/x86_64/libwmf-0.2.8.3-6.4.20060mdk.x86_64.rpm 
 1e51660d73213b67ba80967c945d0d49  2006.0/SRPMS/libwmf-0.2.8.3-6.4.20060mdk.src.rpm

 Mandriva Linux 2007.0:
 6ddcf6fa9d07430b6506c6e539750490  2007.0/i586/libwmf-0.2.8.4-6.1mdv2007.0.i586.rpm
 bca845804d4da48c5945a558d88991ba  2007.0/i586/libwmf0.2_7-0.2.8.4-6.1mdv2007.0.i586.rpm
 e88b4e66f7ba43445578922a77c0af0a  2007.0/i586/libwmf0.2_7-devel-0.2.8.4-6.1mdv2007.0.i586.rpm 
 b6fc7246891a9635e260061666f8d1bc  2007.0/SRPMS/libwmf-0.2.8.4-6.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 9b6632e5918d5984abc3cdc1c3659e47  2007.0/x86_64/lib64wmf0.2_7-0.2.8.4-6.1mdv2007.0.x86_64.rpm
 476cae147f1eefc4cff0d328cc235cfb  2007.0/x86_64/lib64wmf0.2_7-devel-0.2.8.4-6.1mdv2007.0.x86_64.rpm
 b16363e12139fc6786d22a6cfc549bab  2007.0/x86_64/libwmf-0.2.8.4-6.1mdv2007.0.x86_64.rpm 
 b6fc7246891a9635e260061666f8d1bc  2007.0/SRPMS/libwmf-0.2.8.4-6.1mdv2007.0.src.rpm

 Corporate 3.0:
 8ab58c9932da307fc45301d4c43952d0  corporate/3.0/i586/libwmf-0.2.8-6.4.C30mdk.i586.rpm
 8e7d0ab58e3c307b6bb723545d378d1d  corporate/3.0/i586/libwmf0.2_7-0.2.8-6.4.C30mdk.i586.rpm
 c82ea507536b900652218a7ab9d3d69c  corporate/3.0/i586/libwmf0.2_7-devel-0.2.8-6.4.C30mdk.i586.rpm 
 e390b914857d4d67bdb2ef45545a82fd  corporate/3.0/SRPMS/libwmf-0.2.8-6.4.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 ef2f38e688ac821550a8cef7e5ccc48e  corporate/3.0/x86_64/lib64wmf0.2_7-0.2.8-6.4.C30mdk.x86_64.rpm
 440c29e0dac1fd3e980c270e18f53f0f  corporate/3.0/x86_64/lib64wmf0.2_7-devel-0.2.8-6.4.C30mdk.x86_64.rpm
 3125547bd6cdc7eb6fde1a768d9ce771  corporate/3.0/x86_64/libwmf-0.2.8-6.4.C30mdk.x86_64.rpm 
 e390b914857d4d67bdb2ef45545a82fd  corporate/3.0/SRPMS/libwmf-0.2.8-6.4.C30mdk.src.rpm

 Corporate 4.0:
 01ea7b987e96e79f3246cec473e44415  corporate/4.0/i586/libwmf-0.2.8.3-6.4.20060mlcs4.i586.rpm
 82a459c50db3e1042eb489d13c036871  corporate/4.0/i586/libwmf0.2_7-0.2.8.3-6.4.20060mlcs4.i586.rpm
 aef7018051548a36066c65ef59de1571  corporate/4.0/i586/libwmf0.2_7-devel-0.2.8.3-6.4.20060mlcs4.i586.rpm 
 5a04c278fdcb28320aac0cc08e802f14  corporate/4.0/SRPMS/libwmf-0.2.8.3-6.4.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 32bf6a4902c45c2d18de1a025f6cadcc  corporate/4.0/x86_64/lib64wmf0.2_7-0.2.8.3-6.4.20060mlcs4.x86_64.rpm
 db7d2b330c682d23bff9dd852bd6a7ef  corporate/4.0/x86_64/lib64wmf0.2_7-devel-0.2.8.3-6.4.20060mlcs4.x86_64.rpm
 ffb6e68cde364f02cf11f15889fca672  corporate/4.0/x86_64/libwmf-0.2.8.3-6.4.20060mlcs4.x86_64.rpm 
 5a04c278fdcb28320aac0cc08e802f14  corporate/4.0/SRPMS/libwmf-0.2.8.3-6.4.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFyQrxmqjQ0CJFipgRAn1UAKDpxhPL1RgGki/6N/GnV/CbKwG8gwCffsxo
lJ7jUiiRG6SdJt1zH7neN6M=
=rEgb
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ