![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.12.2004.33.1 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu: Security Advisory (USN-33-1) |
Summary: | The remote host is missing an update for the 'libgd' package(s) announced via the USN-33-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'libgd' package(s) announced via the USN-33-1 advisory. Vulnerability Insight: CAN-2004-0990 described several buffer overflows which had been discovered in libgd's PNG handling functions. Another update is required because the update from USN-21-1 was not sufficient to prevent every possible attack. If an attacker tricks a user into loading a malicious PNG or XPM image, they could leverage this into executing arbitrary code in the context of the user opening image. This vulnerability might lead to privilege escalation in customized systems that use server applications which link libgd. However, Warty does not ship such server applications (PHP in Warty uses libgd2 which was already fixed in USN-25-1). Affected Software/OS: 'libgd' package(s) on Ubuntu 4.10. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2004-0941 BugTraq ID: 11663 http://www.securityfocus.com/bid/11663 Computer Incident Advisory Center Bulletin: P-071 http://www.ciac.org/ciac/bulletins/p-071.shtml Debian Security Information: DSA-601 (Google Search) http://www.debian.org/security/2004/dsa-601 http://www.mandriva.com/security/advisories?name=MDKSA-2006:113 http://www.mandriva.com/security/advisories?name=MDKSA-2006:114 http://www.mandriva.com/security/advisories?name=MDKSA-2006:122 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11176 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1195 http://www.redhat.com/support/errata/RHSA-2004-638.html http://www.redhat.com/support/errata/RHSA-2006-0194.html http://secunia.com/advisories/13179/ http://secunia.com/advisories/18686 http://secunia.com/advisories/20824 http://secunia.com/advisories/21050 http://www.trustix.org/errata/2004/0058 https://www.ubuntu.com/usn/usn-25-1/ https://www.ubuntu.com/usn/usn-33-1/ XForce ISS Database: gd-graphics-gdmalloc-bo(18048) https://exchange.xforce.ibmcloud.com/vulnerabilities/18048 |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |