--------------------------------------------------------------------------Debian Security Advisory DSA 608-1                     security@debian.org
https://www.debian.org/security/                             Martin Schulze
December 14th, 2004                     https://www.debian.org/security/faq
--------------------------------------------------------------------------Package        : zgv
Vulnerability  : integer overflows, unsanitised input
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2004-1095 CAN-2004-0999
BugTraq ID     : 11556

Several vulnerabilities have been discovered in zgv, an SVGAlib
graphics viewer for the i386 architecture.  The Common Vulnerabilities
and Exposures Project identifies the following problems:

CAN-2004-1095

    Luke Macken and "infamous41md" independently discoverd multiple
    integer overflows in zgv.  Remote exploitation of an integer
    overflow vulnerability could allow the execution of arbitrary
    code.

CAN-2004-0999

    Mikulas Patocka discovered that malicious multiple-image (e.g.
    animated) GIF images can cause a segmentation fault in zgv.

For the stable distribution (woody) these problems have been fixed in
version 5.5-3woody1.

For the unstable distribution (sid) these problems will be fixed soon.

We recommend that you upgrade your zgv package immediately.


Upgrade Instructions
--------------------wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
--------------------------------  Source archives:

          Size/MD5 checksum:      601 f6114a026863db918a6bd9a6cc201a97
          Size/MD5 checksum:     8541 f501ad407808235577b2bc746ddfe4e6
          Size/MD5 checksum:   329235 629386a4df72f6ec007319bf12db1374

  Intel IA-32 architecture:

          Size/MD5 checksum:   211772 36e675c74bafb546e5f6fb0da36385c3


  These files will probably be moved into the stable distribution on
  its next update.

---------------------------------------------------------------------------------For apt-get: deb https://www.debian.org/security/ stable/updates main
For dpkg-ftp:  dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and https://www.debian.org/distrib/packages

Debian: zgv arbitrary code execution fix

December 14, 2004
Several vulnerabilities have been discovered in zgv, an SVGAlib graphics viewer for the i386 architecture.

Summary


Luke Macken and "infamous41md" independently discoverd multiple
integer overflows in zgv. Remote exploitation of an integer
overflow vulnerability could allow the execution of arbitrary
code.

CAN-2004-0999

Mikulas Patocka discovered that malicious multiple-image (e.g.
animated) GIF images can cause a segmentation fault in zgv.

For the stable distribution (woody) these problems have been fixed in
version 5.5-3woody1.

For the unstable distribution (sid) these problems will be fixed soon.

We recommend that you upgrade your zgv package immediately.


Upgrade Instructions
--------------------wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from...

Read the Full Advisory

Severity
--------------------------------------------------------------------------Package : zgv
CVE ID : CAN-2004-1095 CAN-2004-0999

Related News