User: Password:
|
|
Subscribe / Log in / New account

Gentoo alert 200802-01 (sdl-image)

From:  Raphael Marichez <falco@gentoo.org>
To:  gentoo-announce@gentoo.org
Subject:  [gentoo-announce] [ GLSA 200802-01 ] SDL_image: Two buffer overflow vulnerabilities
Date:  Wed, 6 Feb 2008 22:56:00 +0100
Message-ID:  <20080206215600.GA1682@falco.falcal.net>
Cc:  bugtraq@securityfocus.com, full-disclosure@lists.grok.org.uk, security-alerts@linuxsecurity.com

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200802-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: SDL_image: Two buffer overflow vulnerabilities Date: February 06, 2008 Bugs: #207933 ID: 200802-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Two boundary errors have been identified in SDL_image allowing for the remote execution of arbitrary code or the crash of the application using the library. Background ========== SDL_image is an image file library that loads images as SDL surfaces, and supports various formats like BMP, GIF, JPEG, LBM, PCX, PNG, PNM, TGA, TIFF, XCF, XPM, and XV. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 media-libs/sdl-image < 1.2.6-r1 >= 1.2.6-r1 Description =========== The LWZReadByte() function in file IMG_gif.c and the IMG_LoadLBM_RW() function in file IMG_lbm.c each contain a boundary error that can be triggered to cause a static buffer overflow and a heap-based buffer overflow. The first boundary error comes from some old vulnerable GD PHP code (CVE-2006-4484). Impact ====== A remote attacker can make an application using the SDL_image library to process a specially crafted GIF file or IFF ILBM file that will trigger a buffer overflow, resulting in the execution of arbitrary code with the permissions of the application or the application crash. Workaround ========== There is no known workaround at this time. Resolution ========== All SDL_image users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/sdl-image-1.2.6-r1" References ========== [ 1 ] SA28640 http://secunia.com/advisories/28640/ [ 2 ] CVE-2007-6697 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6697 [ 3 ] CVE-2008-0544 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0544 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200802-01.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds