summaryrefslogtreecommitdiff
blob: d2e5a0c5d4d197fa490e82955066472f79a57646 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200412-03">
  <title>imlib: Buffer overflows in image decoding</title>
  <synopsis>
    Multiple overflows have been found in the imlib library image decoding
    routines, potentially allowing execution of arbitrary code.
  </synopsis>
  <product type="ebuild">imlib</product>
  <announced>2004-12-06</announced>
  <revised count="01">2004-12-06</revised>
  <bug>72681</bug>
  <access>remote</access>
  <affected>
    <package name="media-libs/imlib" auto="yes" arch="*">
      <unaffected range="ge">1.9.14-r3</unaffected>
      <vulnerable range="le">1.9.14-r2</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    imlib is an advanced replacement library for image manipulation
    libraries like libXpm. It is called by numerous programs, including
    gkrellm and several window managers, to help in displaying images.
    </p>
  </background>
  <description>
    <p>
    Pavel Kankovsky discovered that several overflows found in the
    libXpm library (see GLSA 200409-34) also applied to imlib. He also
    fixed a number of other potential flaws.
    </p>
  </description>
  <impact type="normal">
    <p>
    A remote attacker could entice a user to view a carefully-crafted
    image file, which would potentially lead to execution of arbitrary code
    with the rights of the user viewing the image. This affects any program
    that makes use of the imlib library.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All imlib users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=media-libs/imlib-1.9.14-r3"</code>
  </resolution>
  <references>
    <uri link="https://www.gentoo.org/security/en/glsa/glsa-200409-34.xml">GLSA 200409-34</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1026">CAN-2004-1026</uri>
  </references>
  <metadata tag="submitter" timestamp="2004-12-06T09:59:18Z">
    koon
  </metadata>
  <metadata tag="bugReady" timestamp="2004-12-06T09:59:29Z">
    koon
  </metadata>
</glsa>