Boletines de Vulnerabilidades |
Desbordamiento de entero en libwmf |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Obtener acceso |
Dificultad | Experto |
Requerimientos del atacante | Acceso remoto sin cuenta a un servicio exotico |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricant afectat | GNU/Linux |
Software afectado | libwmf 0.2.8.4 |
Descripción |
|
Se ha descubierto una vulnerabilidad en libwmf 0.2.8.4 que es usado por varias aplicaciones incluyendo wv, abiword, freetype, gimp, libgsf, y imagemagick. La vulnerabilidad reside en un desbordamiento de entero en "player.c". Un atacante remoto podría ejecutar código arbitrario mediante el campo "MaxRecordSize" de la cabecera de un fichero WMF. |
|
Solución |
|
Actualización de software Red Hat Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 4) https://rhn.redhat.com/ Mandriva Corporate Server 3.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/libwmf0.2_7-0.2.8-6.3.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/libwmf0.2_7-devel-0.2.8-6.3.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/libwmf-0.2.8-6.3.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/libwmf-0.2.8-6.3.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/lib64wmf0.2_7-0.2.8-6.3.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/lib64wmf0.2_7-devel-0.2.8-6.3.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/libwmf-0.2.8-6.3.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/libwmf-0.2.8-6.3.C30mdk.src.rpm Mandrivalinux 2006 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/RPMS/libwmf0.2_7-0.2.8.3-6.3.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/RPMS/libwmf0.2_7-devel-0.2.8.3-6.3.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/RPMS/libwmf-0.2.8.3-6.3.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/libwmf-0.2.8.3-6.3.20060mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/RPMS/lib64wmf0.2_7-0.2.8.3-6.3.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/RPMS/lib64wmf0.2_7-devel-0.2.8.3-6.3.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/RPMS/libwmf-0.2.8.3-6.3.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/SRPMS/libwmf-0.2.8.3-6.3.20060mdk.src.rpm Suse Linux Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux Debian Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/libw/libwmf/libwmf_0.2.8.3-2sarge1.dsc http://security.debian.org/pool/updates/main/libw/libwmf/libwmf_0.2.8.3-2sarge1.diff.gz http://security.debian.org/pool/updates/main/libw/libwmf/libwmf_0.2.8.3.orig.tar.gz Architecture independent http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-doc_0.2.8.3-2sarge1_all.deb Alpha http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-bin_0.2.8.3-2sarge1_alpha.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-dev_0.2.8.3-2sarge1_alpha.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf0.2-7_0.2.8.3-2sarge1_alpha.deb AMD64 http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-bin_0.2.8.3-2sarge1_amd64.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-dev_0.2.8.3-2sarge1_amd64.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf0.2-7_0.2.8.3-2sarge1_amd64.deb ARM http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-bin_0.2.8.3-2sarge1_arm.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-dev_0.2.8.3-2sarge1_arm.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf0.2-7_0.2.8.3-2sarge1_arm.deb HP Precision http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-bin_0.2.8.3-2sarge1_hppa.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-dev_0.2.8.3-2sarge1_hppa.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf0.2-7_0.2.8.3-2sarge1_hppa.deb Intel IA-32 http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-bin_0.2.8.3-2sarge1_i386.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-dev_0.2.8.3-2sarge1_i386.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf0.2-7_0.2.8.3-2sarge1_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-bin_0.2.8.3-2sarge1_ia64.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-dev_0.2.8.3-2sarge1_ia64.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf0.2-7_0.2.8.3-2sarge1_ia64.deb Motorola 680x0 http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-bin_0.2.8.3-2sarge1_m68k.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-dev_0.2.8.3-2sarge1_m68k.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf0.2-7_0.2.8.3-2sarge1_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-bin_0.2.8.3-2sarge1_mips.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-dev_0.2.8.3-2sarge1_mips.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf0.2-7_0.2.8.3-2sarge1_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-bin_0.2.8.3-2sarge1_mipsel.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-dev_0.2.8.3-2sarge1_mipsel.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf0.2-7_0.2.8.3-2sarge1_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-bin_0.2.8.3-2sarge1_powerpc.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-dev_0.2.8.3-2sarge1_powerpc.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf0.2-7_0.2.8.3-2sarge1_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-bin_0.2.8.3-2sarge1_s390.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-dev_0.2.8.3-2sarge1_s390.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf0.2-7_0.2.8.3-2sarge1_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-bin_0.2.8.3-2sarge1_sparc.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf-dev_0.2.8.3-2sarge1_sparc.deb http://security.debian.org/pool/updates/main/libw/libwmf/libwmf0.2-7_0.2.8.3-2sarge1_sparc.deb |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE | CVE-2006-3376 |
BID | 18751 |
Recursos adicionales |
|
Red Hat Security Advisory (RHSA-2006:0597-5) https://rhn.redhat.com/errata/RHSA-2006-0597.html Mandriva Security Advisory (MDKSA-2006:132) http://www.mandriva.com/security/advisories?name=MDKSA-2006:132 SUSE Security Advisory (SUSE-SR:2006:019) http://www.novell.com/linux/security/advisories/2006_19_sr.html Debian Security Advisory (DSA 1194-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00289.html |
Histórico de versiones |
||
Versión | Comentario | Data |
1.0 | Aviso emitido | 2006-07-18 |
1.1 | Aviso emitido por Mandriva (MDKSA-2006:132) | 2006-07-31 |
1.2 | Aviso emitido por Suse (SUSE-SR:2006:019) | 2006-08-10 |
1.3 | Aviso emitido por Debian (DSA 1194-1) | 2006-10-13 |