Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.4.2018.2470.1
Kategorie:SuSE Local Security Checks
Titel:SUSE: Security Advisory (SUSE-SU-2018:2470-1)
Zusammenfassung:The remote host is missing an update for the 'gtk2' package(s) announced via the SUSE-SU-2018:2470-1 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'gtk2' package(s) announced via the SUSE-SU-2018:2470-1 advisory.

Vulnerability Insight:
This update for gtk2 provides the following fixes:
These security issues were fixed:
- CVE-2017-6312: Prevent integer overflow that allowed context-dependent
attackers to cause a denial of service (segmentation fault and
application crash) via a crafted image entry offset in an ICO file
(bsc#1027026).
- CVE-2017-6314: The make_available_at_least function allowed
context-dependent attackers to cause a denial of service (infinite loop)
via a large TIFF file (bsc#1027025).
- CVE-2017-6313: Prevent integer underflow in the load_resources function
that allowed context-dependent attackers to cause a denial of service
(out-of-bounds read and program crash) via a crafted image entry size in
an ICO file (bsc#1027024).
- CVE-2017-2862: Prevent heap overflow in the
gdk_pixbuf__jpeg_image_load_increment function. A specially crafted jpeg
file could have caused a heap overflow resulting in remote code
execution (bsc#1048289)
- CVE-2017-2870: Prevent integer overflow in the tiff_image_parse
functionality. A specially crafted tiff file could have caused a
heap-overflow resulting in remote code execution (bsc#1048544).
This non-security issue was fixed:
- Prevent an infinite loop when a window is destroyed while traversed
(bsc#1039465).

Affected Software/OS:
'gtk2' package(s) on SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Server 11-SP4, SUSE Linux Enterprise Software Development Kit 11-SP4.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2017-2862
BugTraq ID: 100541
http://www.securityfocus.com/bid/100541
Debian Security Information: DSA-3978 (Google Search)
http://www.debian.org/security/2017/dsa-3978
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0366
Common Vulnerability Exposure (CVE) ID: CVE-2017-2870
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0377
https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html
Common Vulnerability Exposure (CVE) ID: CVE-2017-6312
BugTraq ID: 96779
http://www.securityfocus.com/bid/96779
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/
https://security.gentoo.org/glsa/201709-08
http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html
https://bugzilla.gnome.org/show_bug.cgi?id=779012
http://www.openwall.com/lists/oss-security/2017/02/21/4
http://www.openwall.com/lists/oss-security/2017/02/26/1
Common Vulnerability Exposure (CVE) ID: CVE-2017-6313
https://bugzilla.gnome.org/show_bug.cgi?id=779016
Common Vulnerability Exposure (CVE) ID: CVE-2017-6314
https://bugzilla.gnome.org/show_bug.cgi?id=779020
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.