Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the imlib package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory FEDORA-2004-301 (imlib).
Imlib is a display depth independent image loading and rendering
library. Imlib is designed to simplify and speed up the process of
loading images and obtaining X Window System drawables. Imlib
provides many simple manipulation routines which can be used for
Install imlib if you need an image loading and rendering library for
X11R6, or if you are installing GNOME. You may also want to install
the imlib-cfgeditor package, which will help you configure Imlib.
Several heap overflow vulnerabilities have been found in the imlib BMP
image handler. A possible hacker could create a carefully crafted BMP file in
such a way that it would cause an application linked with imlib to
arbitrary code when the file was opened by a victim. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
CVE-2004-0817 to this issue.
Users of imlib should update to this updated package which contains
backported patches and is not vulnerable to these issues.
Solution : http://www.fedoranews.org/updates/FEDORA-2004-301.shtml
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security
|SAMSUNG 16GB PC4-2133P-RA0-10-DC0 cn m393a2g40db0-cpb 1513 ECC REG SERVER RAM
|DELL POWEREDGE R720 8B 2.5 SERVER E5-2609 2.40GHZ 24GB 4 X 800GB SSD H710
|HPE HP DL380 G9 Gen9 SERVER TWO E5-2609V4 1.7GHZ 16GB 2 X 1.6TB SSD
No Discussions have been posted on this vulnerability.