Vulnerability Bulletins |
Ejecución de código en GNU gv |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Obtener acceso |
Dificulty | Experto |
Required attacker level | Acceso remoto sin cuenta a un servicio exotico |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software | GNU gv <= 3.6.2 |
Description |
|
Se ha descubierto una vulnerabilidad del tipo desbordamiento de búfer en zona de pila en GNU gv 3.6.2 y versiones anteriores. La vulnerabilidad reside en un error en la función "ps_gettext()" en el archivo ps.c. Un atacante remoto podría ejecutar código arbitrario mediante archivos PostScript (con extensión PS) que contengan ciertas cabeceras con comentarios demasiado largos. |
|
Solution |
|
Actualización de software Mandriva Corporate Server 3.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/gv-3.5.8-31.2.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/gv-3.5.8-31.2.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/gv-3.5.8-31.2.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/gv-3.5.8-31.2.C30mdk.src.rpm Mandriva Linux 2006 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/i586/gv-3.6.1-4.3.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/gv-3.6.1-4.3.20060mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/x86_64/gv-3.6.1-4.3.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/gv-3.6.1-4.3.20060mdk.src.rpm Mandriva Linux 2007 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/gv-3.6.1-7.2mdv2007.0.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/gv-3.6.1-7.2mdv2007.0.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/gv-3.6.1-7.2mdv2007.0.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/gv-3.6.1-7.2mdv2007.0.src.rpm Corporate Server 4.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/gv-3.6.1-4.3.20060mlcs4.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/gv-3.6.1-4.3.20060mlcs4.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/gv-3.6.1-4.3.20060mlcs4.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/gv-3.6.1-4.3.20060mlcs4.src.rpm Debian (DSA 1214-2) Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge2.dsc http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge2.diff.gz http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge2_alpha.deb AMD64 http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge2_amd64.deb ARM http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge2_arm.deb HP Precision http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge2_hppa.deb Intel IA-32 http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge2_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge2_ia64.deb Motorola 680x0 http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge2_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge2_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge2_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge2_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge2_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/g/gv/gv_3.6.1-10sarge2_sparc.deb Mandriva (MDKSA-2006:229) Mandriva Linux 2007 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/evince-0.6.0-1.2mdv2007.0.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/evince-0.6.0-1.2mdv2007.0.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/evince-0.6.0-1.2mdv2007.0.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/evince-0.6.0-1.2mdv2007.0.src.rpm Suse Linux Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux Debian (DSA 1243-1) Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/e/evince/evince_0.1.5-2sarge1.dsc http://security.debian.org/pool/updates/main/e/evince/evince_0.1.5-2sarge1.diff.gz http://security.debian.org/pool/updates/main/e/evince/evince_0.1.5.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/e/evince/evince_0.1.5-2sarge1_alpha.deb AMD64 http://security.debian.org/pool/updates/main/e/evince/evince_0.1.5-2sarge1_amd64.deb ARM http://security.debian.org/pool/updates/main/e/evince/evince_0.1.5-2sarge1_arm.deb HP Precision http://security.debian.org/pool/updates/main/e/evince/evince_0.1.5-2sarge1_hppa.deb Intel IA-32 http://security.debian.org/pool/updates/main/e/evince/evince_0.1.5-2sarge1_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/e/evince/evince_0.1.5-2sarge1_ia64.deb Motorola 680x0 http://security.debian.org/pool/updates/main/e/evince/evince_0.1.5-2sarge1_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/e/evince/evince_0.1.5-2sarge1_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/e/evince/evince_0.1.5-2sarge1_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/e/evince/evince_0.1.5-2sarge1_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/e/evince/evince_0.1.5-2sarge1_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/e/evince/evince_0.1.5-2sarge1_sparc.deb |
|
Standar resources |
|
Property | Value |
CVE | CVE-2006-5864 |
BID | 20978 |
Other resources |
|
Mandriva Security Advisory (MDKSA-2006:214-1) http://www.mandriva.com/security/advisories?name=MDKSA-2006:214-1 Debian Security Advisory (DSA 1214-2) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00344.html Mandriva Security Advisory (MDKSA-2006:229) http://www.mandriva.com/security/advisories?name=MDKSA-2006:229 SUSE Security Advisory (SUSE-SR:2006:029) http://www.novell.com/linux/security/advisories/2006_29_sr.html Debian Security Advisory (DSA 1243-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00345.html |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2006-11-20 |
1.1 | Aviso emitido por Debian (DSA 1214-1) | 2006-11-21 |
1.2 | Aviso actualizado por Mandriva (MDKSA-2006:214-1) | 2006-12-04 |
1.3 | Aviso emitido por Mandriva (MDKSA-2006:229) | 2006-12-14 |
1.4 | Aviso emitido por Suse (SUSE-SR:2006:029) | 2006-12-20 |
1.5 | Aviso actualizado por Debian (DSA 1214-2) | 2006-12-28 |
1.6 | Aviso emitido por Debian (DSA 1243-1) | 2006-12-29 |