|
|
Log in / Subscribe / Register

Security

Image handling vulnerabilities

By Jake Edge
April 23, 2008

Bugs that linger for eight years without a fix are probably annoying to whoever reported them; perhaps others as well. When those bugs have possible security implications, it is hard to see how they can remain unfixed for even eight months, let alone years, but that appears to be the case with some GTK image handling bugs. Code to handle image formats has been the source of numerous vulnerabilities along the way, which makes it even harder to see why these have languished so long.

A call for ideas for a hackfest on the GNOME foundation mailing list seems like a bit of a strange place to find information about vulnerabilities, but in the ensuing thread, Michael Chudobiak brought up some bugs that he would like to see addressed, perhaps as part of a hackfest:

I'd like to suggest one possible topic: The pixbuf loaders. They're slow and memory intensive, and this drags down anything that needs thumbnails (Nautilus, etc). There is a lot of opportunity to improve the responsiveness of the desktop here.

The bugs he listed were from 2002 (80925), 2004 (142428), and 2008 (522803), but Alan Cox mentioned that he reported one of them as a GNOME security bug "about eight years ago". In his opinion all of the bugs were of the "well known, never fixed" variety. Because the code in question lives in GTK—used by many GNOME applications—"quite a few gnome apps fed small compressed images explode".

The basic problem is that the routines handling images create the full-resolution image in memory regardless of the size requested. In addition, various memory-intensive techniques are used to scale the image to the requested size. This impacts Nautilus and other GNOME programs that create thumbnails of large images.

Presumably, a denial of service, at a minimum, can result from these operations, though there may be other ways to exploit any program crashes that result. Cox has a plan to see them get fixed:

Unfortunately they are well known but nobody seems to care. I'll forward your message to the vendor security list and we'll see what happens. Probably the bug just needs to be made *very* public to incentivise people to fix it 8)

The vendor security list, often abbreviated vendor-sec, is a closed mailing list for distribution security teams to exchange information about vulnerabilities in various programs. It is closed so that bugs that are not publicly known can be freely discussed. Whether Cox's posting to that list spurs any action remains to be seen.

It is a rare week where LWN does not report some kind of image handling botch as a new vulnerability. This week, a cups vulnerability in handling PNG files could lead to a denial of service; last week we reported an Opera vulnerability in handling images in HTML canvas elements that could possibly lead to arbitrary code execution. Image handling is an area where all bugs need to be scrutinized carefully for potential security issues.

Hopefully, part of the problem is that the GNOME hackers did not realize the security implications of the bugs. There does seem to be ample complaint about performance problems, though, to get some kind of action over the last six or eight years. This is a set of related bugs that have seemingly been overlooked for a long time. Perhaps that time is now coming to an end.

Comments (2 posted)

New vulnerabilities

clamav: buffer overflows

Package(s):clamav CVE #(s):CVE-2008-0314 CVE-2008-1100
Created:April 18, 2008 Updated:July 17, 2008
Description: Several remote vulnerabilities have been discovered in the Clam anti-virus toolkit.
Alerts:
Fedora FEDORA-2008-6422 clamav 2008-07-17
Gentoo 200805-19 clamav 2008-05-20
Fedora FEDORA-2008-3900 clamav 2008-05-14
Fedora FEDORA-2008-3420 clamav 2008-04-29
Mandriva MDVSA-2008:088 clamav 2007-04-17
Fedora FEDORA-2008-3358 clamav 2008-04-29
SuSE SUSE-SA:2008:024 clamav 2008-04-24
Debian DSA-1549-1 clamav 2008-04-17

Comments (none posted)

clamav: multiple vulnerabilities

Package(s):clamav CVE #(s):CVE-2008-1387 CVE-2008-1833 CVE-2008-1835 CVE-2008-1836 CVE-2008-1837
Created:April 18, 2008 Updated:July 17, 2008
Description: From the CVE entries:

ClamAV before 0.93 allows remote attackers to cause a denial of service (CPU consumption) via a crafted ARJ archive, as demonstrated by the PROTOS GENOME test suite for Archive Formats. (CVE-2008-1387)

Heap-based buffer overflow in libclamav in ClamAV 0.92.1 allows remote attackers to execute arbitrary code via a crafted WWPack compressed PE binary. (CVE-2008-1833)

ClamAV before 0.93 allows remote attackers to bypass the scanning enging via a RAR file with an invalid version number, which cannot be parsed by ClamAV but can be extracted by Winrar. (CVE-2008-1835)

The rfc2231 function in message.c in libclamav in ClamAV before 0.93 allows remote attackers to cause a denial of service (crash) via a crafted message that produces a string that is not null terminated, which triggers a buffer over-read. (CVE-2008-1836)

libclamunrar in ClamAV before 0.93 allows remote attackers to cause a denial of service (crash) via crafted RAR files that trigger "memory problems," as demonstrated by the PROTOS GENOME test suite for Archive Formats. (CVE-2008-1837)

Alerts:
Fedora FEDORA-2008-6422 clamav 2008-07-17
Gentoo 200805-19 clamav 2008-05-20
Fedora FEDORA-2008-3900 clamav 2008-05-14
Fedora FEDORA-2008-3358 clamav 2008-04-29
Fedora FEDORA-2008-3420 clamav 2008-04-29
SuSE SUSE-SA:2008:024 clamav 2008-04-24
Mandriva MDVSA-2008:088 clamav 2007-04-17

Comments (none posted)

cups: arbitrary code execution

Package(s):cups CVE #(s):CVE-2008-1722
Created:April 21, 2008 Updated:December 22, 2008
Description:

From the Gentoo advisory:

Thomas Pollet reported a possible integer overflow vulnerability in the PNG image handling in the file filter/image-png.c.

A malicious user might be able to execute arbitrary code with the privileges of the user running CUPS (usually lp), or cause a Denial of Service by sending a specially crafted PNG image to the print server. The vulnerability is exploitable via the network if CUPS is sharing printers remotely.

Alerts:
rPath rPSA-2008-0338-1 cups 2008-12-19
Ubuntu USN-656-1 cupsys 2008-10-15
Fedora FEDORA-2008-8844 cups 2008-10-16
Fedora FEDORA-2008-8801 cups 2008-10-16
Mandriva MDVSA-2008:170 cups 2007-08-13
Debian DSA-1625-1 cupsys 2008-08-01
CentOS CESA-2008:0498 cups 2008-06-04
Red Hat RHSA-2008:0498-01 cups 2008-06-04
Fedora FEDORA-2008-3756 cups 2008-05-13
Fedora FEDORA-2008-3586 cups 2008-05-09
Fedora FEDORA-2008-3449 cups 2008-05-09
Ubuntu USN-606-1 cupsys 2008-05-05
Gentoo 200804-23 cups 2008-04-18

Comments (none posted)

dbmail: authentication bypass

Package(s):dbmail CVE #(s):CVE-2007-6714
Created:April 21, 2008 Updated:May 21, 2008
Description:

From the Gentoo advisory:

A vulnerability in DBMail's authldap module when used in conjunction with an Active Directory server has been reported by vugluskr. When passing a zero length password to the module, it tries to bind anonymously to the LDAP server. If the LDAP server allows anonymous binds, this bind succeeds and results in a successful authentication to DBMail.

By passing an empty password string to the server, an attacker could be able to log in to any account.

Alerts:
Fedora FEDORA-2008-4245 dbmail 2008-05-21
Fedora FEDORA-2008-3371 dbmail 2008-04-29
Fedora FEDORA-2008-3333 dbmail 2008-04-29
Gentoo 200804-24 dbmail 2008-04-18

Comments (none posted)

fedora-ds-admin: privilege escalation and arbitrary command execution

Package(s):fedora-ds-admin CVE #(s):CVE-2008-0892 CVE-2008-0893
Created:April 22, 2008 Updated:April 23, 2008
Description: From the CVE entries:
The replication monitor CGI script (repl-monitor-cgi.pl) in Red Hat Administration Server, as used by Red Hat Directory Server 8.0 EL4 and EL5, allows remote attackers to execute arbitrary commands.

Red Hat Administration Server, as used by Red Hat Directory Server 8.0 EL4 and EL5, does not properly restrict access to CGI scripts, which allows remote attackers to perform administrative actions.

Alerts:
Fedora FEDORA-2008-3214 fedora-ds-admin 2008-04-21
Fedora FEDORA-2008-3220 fedora-ds-admin 2008-04-21

Comments (none posted)

feh: shell command injection

Package(s):feh CVE #(s):
Created:April 17, 2008 Updated:April 23, 2008
Description: feh has a vulnerability involving shell command injection using specially crafted file names.
Alerts:
Fedora FEDORA-2008-3068 feh 2008-04-17
Fedora FEDORA-2008-3064 feh 2008-04-17

Comments (none posted)

firefox: denial of service

Package(s):firefox CVE #(s):CVE-2008-1380
Created:April 17, 2008 Updated:January 8, 2009
Description: From the Red Hat alert: A flaw was found in the processing of malformed JavaScript content. A web page containing such malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox.
Alerts:
Debian DSA-1696-1 icedove 2009-01-07
Gentoo 200808-03 mozilla-firefox 2008-08-06
SuSE SUSE-SR:2008:013 thunderbird, xulrunner, tkimg, cups, qemu, gstreamer010-plugins-good, pan, libxslt 2008-06-13
Mandriva MDVSA-2008:110 mozilla-firefox 2008-06-05
Gentoo 200805-18 mozilla-firefox 2008-05-20
Fedora FEDORA-2008-3557 thunderbird 2008-05-09
Fedora FEDORA-2008-3519 thunderbird 2008-05-09
SuSE SUSE-SR:2008:011 rsync, MozillaFirefox, poppler, nagios, lighttpd, sarg, squid, bzip2, kdelibs3, texlive-bin, kdelibs4, Sun Java 2008-05-09
Foresight FLEA-2008-0008-1 firefox 2008-05-08
CentOS CESA-2008:0224 thunderbird 2008-05-08
Fedora FEDORA-2008-3283 kazehakase 2008-04-22
Fedora FEDORA-2008-3283 devhelp 2008-04-22
Fedora FEDORA-2008-3283 gnome-web-photo 2008-04-22
Fedora FEDORA-2008-3283 yelp 2008-04-22
Fedora FEDORA-2008-3283 epiphany-extensions 2008-04-22
Fedora FEDORA-2008-3264 seamonkey 2008-04-22
Fedora FEDORA-2008-3249 Miro 2008-04-22
Fedora FEDORA-2008-3249 epiphany 2008-04-22
Debian DSA-1555-1 iceweasel 2008-04-23
Fedora FEDORA-2008-3283 ruby-gnome2 2008-04-22
Fedora FEDORA-2008-3283 firefox 2008-04-22
Fedora FEDORA-2008-3283 gtkmozembedmm 2008-04-22
Slackware SSA:2008-108-01 mozilla 2008-04-18
Red Hat RHSA-2008:0222-02 firefox 2008-04-16
Red Hat RHSA-2008:0224-01 thunderbird 2008-04-30
Debian DSA-1562-1 iceape 2008-04-28
Debian DSA-1558-1 xulrunner 2008-04-24
Fedora FEDORA-2008-3249 yelp 2008-04-22
Fedora FEDORA-2008-3249 liferea 2008-04-22
Fedora FEDORA-2008-3249 gtkmozembedmm 2008-04-22
Fedora FEDORA-2008-3249 gnome-python2-extras 2008-04-22
Fedora FEDORA-2008-3249 galeon 2008-04-22
Fedora FEDORA-2008-3249 devhelp 2008-04-22
Fedora FEDORA-2008-3249 openvrml 2008-04-22
Fedora FEDORA-2008-3249 epiphany-extensions 2008-04-22
Fedora FEDORA-2008-3249 firefox 2008-04-22
Fedora FEDORA-2008-3249 ruby-gnome2 2008-04-22
Fedora FEDORA-2008-3249 kazehakase 2008-04-22
Fedora FEDORA-2008-3249 chmsee 2008-04-22
Fedora FEDORA-2008-3231 seamonkey 2008-04-22
Fedora FEDORA-2008-3283 chmsee 2008-04-22
Fedora FEDORA-2008-3283 Miro 2008-04-22
Fedora FEDORA-2008-3283 openvrml 2008-04-22
Fedora FEDORA-2008-3283 galeon 2008-04-22
Fedora FEDORA-2008-3283 epiphany 2008-04-22
Fedora FEDORA-2008-3283 liferea 2008-04-22
Fedora FEDORA-2008-3283 gnome-python2-extras 2008-04-22
Ubuntu USN-602-1 firefox 2008-04-22
Red Hat RHSA-2008:0223-02 seamonkey 2008-04-16

Comments (none posted)

ikiwiki: cross-site request forgery

Package(s):ikiwiki CVE #(s):CVE-2008-0165
Created:April 21, 2008 Updated:June 2, 2008
Description:

From the Debian advisory:

It has been discovered that ikiwiki, a Wiki implementation, does not guard password and content changes against cross-site request forgery (CSRF) attacks.

Alerts:
Debian DSA-1553-2 ikiwiki 2008-06-01
Debian DSA-1553-1 ikiwiki 2008-04-20

Comments (none posted)

mplayer: arbitrary code execution

Package(s):mplayer CVE #(s):CVE-2008-1558
Created:April 21, 2008 Updated:September 16, 2008
Description:

From the Debian advisory:

It was discovered that the MPlayer movie player performs insufficient input sanitising on SDP session data, leading to potential execution of arbitrary code through a malformed multimedia stream.

Alerts:
Mandriva MDVSA-2008:196 mplayer 2008-09-15
Gentoo 200805-22 mplayer 2008-05-29
Debian DSA-1552-1 mplayer 2008-04-19

Comments (none posted)

mt-daapd: integer overflow

Package(s):mt-daapd CVE #(s):CVE-2008-1771
Created:April 23, 2008 Updated:September 1, 2008
Description: The mt-daapd music server suffers from an integer overflow enabling remote denial of service attacks and possibly code execution.
Alerts:
Debian DSA-1597-2 mt-daapd 2008-08-30
Debian DSA-1597-1 mt-daapd 2008-06-12
Fedora FEDORA-2008-4126 mt-daapd 2008-05-17
Fedora FEDORA-2008-3250 mt-daapd 2008-04-22

Comments (none posted)

openfire: denial of service

Package(s):openfire CVE #(s):CVE-2008-1728
Created:April 23, 2008 Updated:April 23, 2008
Description: The openfire (formerly wildfire) Jabber server cannot cope with clients which fail to read messages, leading to a denial of service vulnerability.
Alerts:
Gentoo 200804-26 openfire 2008-04-23

Comments (none posted)

openoffice.org: multiple vulnerabilities

Package(s):openoffice.org CVE #(s):CVE-2007-5745 CVE-2007-5746 CVE-2007-5747 CVE-2008-0320
Created:April 17, 2008 Updated:September 10, 2008
Description: From the Debian alert:

CVE-2007-5745, CVE-2007-5747: Several bugs have been discovered in the way OpenOffice.org parses Quattro Pro files that may lead to a overflow in the heap potentially leading to the execution of arbitrary code.

CVE-2007-5746: Specially crafted EMF files can trigger a buffer overflow in the heap that may lead to the execution of arbitrary code.

CVE-2008-0320: A bug has been discovered in the processing of OLE files that can cause a buffer overflow in the heap potentially leading to the execution of arbitrary code.

Alerts:
Fedora FEDORA-2008-7531 openoffice.org 2008-09-05
Fedora FEDORA-2008-5247 openoffice.org 2008-06-11
Fedora FEDORA-2008-5239 openoffice.org 2008-06-11
Fedora FEDORA-2008-4104 openoffice.org 2008-05-17
Gentoo 200805-16 openoffice 2008-05-14
Ubuntu USN-609-1 openoffice.org 2008-05-06
Mandriva MDVSA-2008:095 openoffice.org 2008-05-02
SuSE SUSE-SA:2008:023 OpenOffice_org 2008-04-18
Red Hat RHSA-2008:0175-01 openoffice.org 2008-04-17
Fedora FEDORA-2008-3251 openoffice.org 2008-04-22
Mandriva MDVSA-2008:090 OpenOffice.org 2008-04-20
Debian DSA-1547-1 openoffice.org 2008-04-17

Comments (none posted)

php-toolkit: denial of service

Package(s):php-toolkit CVE #(s):CVE-2008-1734
Created:April 18, 2008 Updated:April 23, 2008
Description: From the Gentoo advisory: Toni Arnold, David Sveningsson, Michal Bartoszkiewicz, and Joseph reported that php-select does not quote parameters passed to the "tr" command, which could convert the "-D PHP5" argument in the "APACHE2_OPTS" setting in the file /etc/conf.d/apache2 to lower case.
Alerts:
Gentoo 200804-19 php-toolkit 2008-04-17

Comments (none posted)

poppler: arbitrary code execution

Package(s):poppler CVE #(s):CVE-2008-1693
Created:April 17, 2008 Updated:September 17, 2008
Description: From the Gentoo alert: Poppler does not handle fonts inside PDF files safely, allowing for execution of arbitrary code.
Alerts:
Mandriva MDVSA-2008:197-1 koffice 2008-09-16
Mandriva MDVSA-2008:197 koffice 2008-09-15
Mandriva MDVSA-2008:173 kdegraphics 2008-08-19
SuSE SUSE-SR:2008:013 thunderbird, xulrunner, tkimg, cups, qemu, gstreamer010-plugins-good, pan, libxslt 2008-06-13
SuSE SUSE-SR:2008:011 rsync, MozillaFirefox, poppler, nagios, lighttpd, sarg, squid, bzip2, kdelibs3, texlive-bin, kdelibs4, Sun Java 2008-05-09
CentOS CESA-2008:0262 gpdf 2008-05-08
Red Hat RHSA-2008:0262-01 gpdf 2008-05-08
Fedora FEDORA-2008-3312 poppler 2008-04-29
Ubuntu USN-603-2 koffice 2008-04-17
Ubuntu USN-603-1 poppler 2008-04-17
Red Hat RHSA-2008:0239-01 poppler 2008-04-17
Red Hat RHSA-2008:0238-01 kdegraphics 2008-04-17
Debian DSA-1548-1 xpdf 2008-04-17
Mandriva MDVSA-2008:089 poppler 2008-04-17
Red Hat RHSA-2008:0240-01 xpdf 2008-04-17
Gentoo 200804-18:02 poppler 2008-04-17

Comments (none posted)

python2.4: arbitrary code execution

Package(s):python2.4 CVE #(s):CVE-2008-1887
Created:April 21, 2008 Updated:August 25, 2009
Description:

From the Debian advisory:

CVE-2008-1887: Justin Ferguson discovered that insufficient input validation in PyString_FromStringAndSize() may lead to the execution of arbitrary code.

Alerts:
rPath rPSA-2009-0122-1 python 2009-08-24
CentOS CESA-2009:1176 python 2009-07-29
CentOS CESA-2009:1178 python 2009-07-27
Red Hat RHSA-2009:1176-01 python 2009-07-27
Red Hat RHSA-2009:1177-01 python 2009-07-27
Red Hat RHSA-2009:1178-02 python 2009-07-27
SuSE SUSE-SR:2008:017 powerdns, dnsmasq, python, mailman, ruby, Opera, neon, rxvt-unicode, perl, wireshark, namazu, gnome-screensaver, mysql 2008-08-29
Ubuntu USN-632-1 python2.4, python2.5 2008-08-01
Debian DSA-1620-1 python2.5 2008-07-27
Gentoo 200807-01 python 2008-07-01
Debian DSA-1551-1 python2.4 2008-04-19

Comments (none posted)

speex: insufficient boundary checks

Package(s):speex CVE #(s):CVE-2008-1686
Created:April 17, 2008 Updated:August 7, 2008
Description: The speex speech codec has insufficient boundary checking in speex_packet_to_header().
Alerts:
Ubuntu USN-635-1 xine-lib 2008-08-06
Mandriva MDVSA-2008:124 xine-lib 2008-06-26
SuSE SUSE-SR:2008:013 thunderbird, xulrunner, tkimg, cups, qemu, gstreamer010-plugins-good, pan, libxslt 2008-06-13
SuSE SUSE-SR:2008:012 xine, xemacs, emacs, opensuse-updater, libvorbis, vorbis-tools, pdns-recursor, openwsman 2008-06-06
Debian DSA-1586-1 xine-lib 2008-05-22
Debian DSA-1584-1 libfishsound 2008-05-21
Fedora FEDORA-2008-3117 libfishsound 2008-05-17
Ubuntu USN-611-3 gst-plugins-good0.10 2008-05-08
Ubuntu USN-611-2 vorbis-tools 2008-05-08
Ubuntu USN-611-1 speex 2008-05-08
Mandriva MDVSA-2008:094 speex 2007-04-29
Mandriva MDVSA-2008:092 gstreamer-plugins-good 2008-04-29
Mandriva MDVSA-2008:093 vorbis-tools 2008-04-29
Slackware SSA:2008-111-01 xine 2008-04-22
Red Hat RHSA-2008:0235-01 speex 2008-04-16
Gentoo 200804-17 speex 2008-04-17
Fedora FEDORA-2008-3059 libfishsound 2008-04-17
Fedora FEDORA-2008-3103 speex 2008-04-17
Fedora FEDORA-2008-3191 speex 2008-04-17

Comments (none posted)

sun java: multiple vulnerabilities

Package(s):sun-jre, sun-jdk CVE #(s):CVE-2007-5689 CVE-2007-5237 CVE-2008-0628
Created:April 18, 2008 Updated:April 28, 2008
Description: From the CVE entries:

The Java Virtual Machine (JVM) in Sun Java Runtime Environment (JRE) in SDK and JRE 1.3.x through 1.3.1_20 and 1.4.x through 1.4.2_15, and JDK and JRE 5.x through 5.0 Update 12 and 6.x through 6 Update 2, allows remote attackers to execute arbitrary programs, or read or modify arbitrary files, via applets that grant privileges to themselves. (CVE-2007-5689)

Java Web Start in Sun JDK and JRE 6 Update 2 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read and modify local files via an untrusted application, aka "two vulnerabilities." (CVE-2007-5237)

The XML parsing code in Sun Java Runtime Environment JDK and JRE 6 Update 3 and earlier processes external entity references even when the "external general entities" property is false, which allows remote attackers to conduct XML external entity (XXE) attacks and cause a denial of service or access restricted resources. (CVE-2008-0628)

Alerts:
Red Hat RHSA-2008:0245-01 java-1.6.0-bea 2008-04-28
Gentoo 200804-20 sun-jre, sun-jdk 2008-04-17

Comments (none posted)

suphp: privilege escalation

Package(s):suphp CVE #(s):CVE-2008-1614
Created:April 18, 2008 Updated:April 23, 2008
Description: suPHP before 0.6.3 allows local users to gain privileges via (1) a race condition that involves multiple symlink changes to point a file owned by a different user, or (2) a symlink to the directory of a different user, which is used to determine privileges.
Alerts:
Debian DSA-1550-1 suphp 2008-04-17

Comments (none posted)

vlc: multiple vulnerabilities

Package(s):vlc CVE #(s):CVE-2008-1881 CVE-2008-1489 CVE-2008-1768 CVE-2008-1769
Created:April 23, 2008 Updated:June 18, 2009
Description: The latest set of vulnerabilities in vlc include a stack-based buffer overflow in the subtitle code (CVE-2008-1881), an integer overflow vulnerability in the MP4 code leading to a heap overflow (CVE-2008-1489), more integer overflows (CVE-2008-1768), and a "boundary error" in Cinepak leading to memory corruption (CVE-2008-1769).
Alerts:
Debian DSA-1819-1 vlc 2009-06-18
Gentoo 200804-25 vlc 2008-04-23

Comments (none posted)

WebKit: cross-site scripting and code execution

Package(s):WebKit CVE #(s):CVE-2008-1010 CVE-2008-1011
Created:April 23, 2008 Updated:April 30, 2008
Description: The WebKit browser engine suffers from a buffer overflow leading to arbitrary code execution and a cross-site scripting vulnerability; some more information is available from this summary.
Alerts:
Fedora FEDORA-2008-3415 midori 2008-04-29
Fedora FEDORA-2008-3415 WebKit 2008-04-29
Fedora FEDORA-2008-3229 kazehakase 2008-04-22
Fedora FEDORA-2008-3229 midori 2008-04-22
Fedora FEDORA-2008-3229 WebKit 2008-04-22

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2008, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds