Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the imlib package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory FEDORA-2004-300 (imlib).
Imlib is a display depth independent image loading and rendering
library. Imlib is designed to simplify and speed up the process of
loading images and obtaining X Window System drawables. Imlib
provides many simple manipulation routines which can be used for
Install imlib if you need an image loading and rendering library for
X11R6, or if you are installing GNOME. You may also want to install
the imlib-cfgeditor package, which will help you configure Imlib.
Several heap overflow vulnerabilities have been found in the imlib BMP
image handler. A possible hacker could create a carefully crafted BMP file in
such a way that it would cause an application linked with imlib to
arbitrary code when the file was opened by a victim. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
CVE-2004-0817 to this issue.
Users of imlib should update to this updated package which contains
backported patches and is not vulnerable to these issues.
Solution : http://www.fedoranews.org/updates/FEDORA-2004-300.shtml
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security
|Knoppix 9.1.0 (i486) DVD
|Knoppix V3.2 Linux CD Bootable Operating System Data Rcovery Tool
|Knoppix Linux 9.1 LIVE 32GB bootable USB 3.1/3.0/2.0 w/ PERSISTENCE
|Knoppix Linux Bootable OS v8.6 "Original Live Operating System" 32G USB Stick
No Discussions have been posted on this vulnerability.