SuSE: 'imlib' Remote privilege escalation vulnerability
Summary
______________________________________________________________________________
SuSE Security Announcement
Package: imlib
Announcement-ID: SuSE-SA:2002:015
Date: Tuesday, May 7th 2002 11:30 MEST
Affected products: 6.4, 7.0, 7.1, 7.2, 7.3, 8.0
Vulnerability Type: remote privilege escalation
Severity (1-10): 3
SuSE default package: yes
Other affected systems: all systems/applications using imlib
Content of this advisory:
1) security vulnerability resolved: imlib fallback and Denial-of-Service
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
The imlib library can be used by X11 applications to handle various
kinds of image data.
Imlib could, under certain circumstances, revert to using a netpbm
library which is well known to have security problems and should not
be used for handling untrusted data. Furthermore a heap corruption
could occur in the imlib code.
An attacker could send a maliciously formated image file to trigger
a Denial-of-Service attack or even execute arbitrary code on the
victim's machine.
Thanks go to Al Viro and Alan Cox who discovered these bugs.
The imlib RPM package is installed by default and affects all applications
linked against imlib, like imager viewers, browsers, mail clients and
so on.
About 140 applications shipped with the SuSE Linux distribution depend
on imlib. You need to update your system, as no temporary workaround is
possbible.
Please run ldconfig(8) as root after updating imlib and restart all
applications using imlib.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
i386 Intel Platform:
SuSE-8.0
9137d95a9205a335871a71341c2c70b4
SuSE-8.0
4abd84a67aacb2c2fa21582e228e6a1d
SuSE-8.0
43103d0ff1e60f008499a69519d722d3
SuSE-8.0
02df11424f082e4aed1c93527f7bab69
SuSE-8.0
7680c38f5fef811bc96ff2fc00baafad
SuSE-8.0
bb449e5db3bf0827168b78d7636accac
source rpm:
d7cb0ddd0e18d645191f967b5b6e8109
SuSE-7.3
b114e4ea9babf4ac8bd241674b0be0fd
SuSE-7.3
7b3cd1c19161ed500bc4a0306eb66d0c
SuSE-7.3
41af6a469645a4ce4399935604cbf4c0
source rpm:
1839a719883e4aa5e543ee1bd22dc780
SuSE-7.2
9ec9fb90418a6ba76432334cb7e15bb8
SuSE-7.2
584e88a451341910524740cc54ca9c64
SuSE-7.2
c8c25f5396d565f75f68d48d7911813b
source rpm:
a5691ba54118a52454d394e346a6b8b4
SuSE-7.1
dc9d57492cd4faa497e23e14fcf5e57b
SuSE-7.1
58f03af3039c42db5b5a9d1a6acd9c27
SuSE-7.1
b82aa8abda460e45094fb4a0d683971f
source rpm:
f16db540325f4626aa5fda6ab5aa196b
SuSE-7.0
c089d699c31addadba09fd967677e535
SuSE-7.0
ee3c4bf8ab5e7068afcfb7160c38653f
SuSE-7.0
253759ffd47eb19831e61c52673ebc6f
source rpm:
2bb8b096627c72e25949d4e22fc26c3a
SuSE-6.4
b3175095dade1c545822b42707a99820
SuSE-6.4
a54bfa0d5b6333c20497dfd6ae1c65f6
SuSE-6.4
6d5815e9cfc1e9020dd758fcf3e15f0b
source rpm:
ce83d062fb32cf34ed6921490c732a51
Sparc Platform:
SuSE-7.3
58f0df8b16d05b7b28d919c53b20ddfd
SuSE-7.3
92c1e1a5a67b0a73197f793101af5955
SuSE-7.3
744db88a54bcff79068a7b2392e34fc2
source rpm:
fa4c576fea3185bc7624e50620dbaaf5
SuSE-7.1
dc3336004bc77ceca74035cb05b050f9
SuSE-7.1
a27820491016c5ff1fac5706b7042158
SuSE-7.1
b8b28901c088bc6763f462753ca58b7c
source rpm:
7605166c8ee6fa6439ade68e0d67c5c6
SuSE-7.0
8b1e28d9aa91061aed4569015e058fac
SuSE-7.0
01c5dae090bfe25d641d3389a11c16c2
SuSE-7.0
3be7654afc64fb5a10c145f67dce9ba3
source rpm:
6531693204e86106ceee748758038a07
AXP Alpha Platform:
SuSE-7.1
a84242de9afeec0b77f9d85b54f51f5b
SuSE-7.1
a2829f4eba557fbc3160b6b4ffec0ac5
SuSE-7.1
691b3d75dab0a3487b9f57c9b3501b17
source rpm:
58697086bf51f5231a1708765db8312c
SuSE-7.0
fbbf3f167844f0b046aafc14fed3b50e
SuSE-7.0
e5a8c05ca99ce4b38de47b35258423d7
SuSE-7.0
26cc11948b4d61d6e4c0aa35472d2d7d
source rpm:
90df4b7a6860281ad6130b09e7e634e3
SuSE-6.4
2b231d47fed0f5ac88299abbb6abb1cd
SuSE-6.4
99b4a22d820a3d846fc1bf0ca94843e4
SuSE-6.4
a7e9b77c92c28fe6bd07d4d8634a5253
source rpm:
11a996b48ee33c34b34acffad3a2a56c
PPC Power PC Platform:
SuSE-7.3
f9c093c06636b62507846c6679e1e86d
SuSE-7.3
973e484ba78847b5c47d5d6ef3972f56
SuSE-7.3
e06812ab04e4cbdc781d8e8d29dc3372
source rpm:
8f85b9a40d36d328deb20b3255ddc05c
SuSE-7.1
4a22c12194b6f1b80123a3466fe944c3
SuSE-7.1
85139eb233c567783c053f110baadb66
SuSE-7.1
ae31194e59d40267b36e38344b1ad139
source rpm:
6558c6ca5bee620485fd52a9a7ec316d
SuSE-7.0
e34ddef90edd1effb95771b5d7f6f935
SuSE-7.0
13eb42a163f919c9a4c097d8dc55a4a3
SuSE-7.0
9e73db46c744ee38118c9cd4b97bda7a
source rpm:
d321ee18493970c45b232362653dc447
SuSE-6.4
3d255a622cd006656a662b0e7a5efb87
SuSE-6.4
311ac75ac7622c6b453c5d6ed5ef9c28
SuSE-6.4
c5a86e6598a9fc801f56533e060dcc61
source rpm:
294626d55b89e1a5b940b4441172b578
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- screen
A security report about a locally exploitable bug in screen's braile code
was published on Bugtraq. SuSE ships screen without this code enabled.
On SuSE version 8.0 screen isn't even running with higher privileges
anymore.
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References