Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.58005
Categoría:Mandrake Local Security Checks
Título:Mandrake Security Advisory MDKSA-2007:039 (gtk+2.0)
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing an update to gtk+2.0
announced via advisory MDKSA-2007:039.

The GdkPixbufLoader function in GIMP ToolKit (GTK+) in GTK 2 (gtk2)
allows context-dependent attackers to cause a denial of service (crash)
via a malformed image file. (CVE-2007-0010)

The version of libgtk+2.0 shipped with Mandriva Linux 2007 fails
various portions of the lsb-test-desktop test suite, part of LSB 3.1
certification testing.

The updated packages also address the following issues:

The Home and Desktop entries in the GTK File Chooser are not always
visible (#26644).

GTK+-based applications (which includes all the Mandriva Linux
configuration tools, for example) crash (instead of falling back to the
default theme) when an invalid icon theme is selected. (#27013)

Additional patches from GNOME CVS have been included to address the
following issues from the GNOME bugzilla:

* 357132 - fix RGBA colormap issue

* 359537,357280,359052 - fix various printer bugs

* 357566,353736,357050,363437,379503 - fix various crashes

* 372527 - fix fileselector bug +

potential deadlock

Affected: 2007.0, Corporate 3.0, Corporate 4.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDKSA-2007:039
http://qa.mandriva.com/show_bug.cgi?id=26644
http://qa.mandriva.com/show_bug.cgi?id=27013

Risk factor : Medium

CVSS Score:
2.1

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2007-0010
1017552
http://securitytracker.com/id?1017552
22209
http://www.securityfocus.com/bid/22209
23884
http://secunia.com/advisories/23884
23933
http://secunia.com/advisories/23933
23935
http://secunia.com/advisories/23935
23984
http://secunia.com/advisories/23984
24006
http://secunia.com/advisories/24006
24010
http://secunia.com/advisories/24010
24095
http://secunia.com/advisories/24095
31621
http://osvdb.org/31621
ADV-2007-0331
http://www.vupen.com/english/advisories/2007/0331
DSA-1256
https://www.debian.org/security/2007/dsa-1256
MDKSA-2007:039
http://www.mandriva.com/security/advisories?name=MDKSA-2007:039
RHSA-2007:0019
http://www.redhat.com/support/errata/RHSA-2007-0019.html
SUSE-SR:2007:002
http://www.novell.com/linux/security/advisories/2007_02_sr.html
USN-415-1
http://www.ubuntu.com/usn/usn-415-1
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218932
https://issues.rpath.com/browse/RPL-984
oval:org.mitre.oval:def:10325
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10325
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.