Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the imlib package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory FEDORA-2004-300 (imlib).
Imlib is a display depth independent image loading and rendering
library. Imlib is designed to simplify and speed up the process of
loading images and obtaining X Window System drawables. Imlib
provides many simple manipulation routines which can be used for
Install imlib if you need an image loading and rendering library for
X11R6, or if you are installing GNOME. You may also want to install
the imlib-cfgeditor package, which will help you configure Imlib.
Several heap overflow vulnerabilities have been found in the imlib BMP
image handler. A possible hacker could create a carefully crafted BMP file in
such a way that it would cause an application linked with imlib to
arbitrary code when the file was opened by a victim. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
CVE-2004-0817 to this issue.
Users of imlib should update to this updated package which contains
backported patches and is not vulnerable to these issues.
Solution : http://www.fedoranews.org/updates/FEDORA-2004-300.shtml
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security
|1tb internal hard drive
|Drevo X1 SSD 240GB 2.5" SATA III Internal Solid State Hard Drive Read 550MB/S
|NEW Verbatim 97394 1TB Titan XS Portable Hard Drive, USB 3.0 Black 1 TB Drive
|Liteon-LMH-256V2M Internal mSATA SSD 256GB - USED
No Discussions have been posted on this vulnerability.