Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 3 2005-268: gtk2


Vulnerability Assessment Details

Fedora Core 3 2005-268: gtk2

Vulnerability Assessment Summary
Check for the version of the gtk2 package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2005-268 (gtk2).

GTK+ is a multi-platform toolkit for creating graphical user
interfaces. Offering a complete set of widgets, GTK+ is suitable for
projects ranging from small one-off tools to complete application
suites.

Update Information:

David Costanzo found a bug in the way GTK+ processes BMP images.
It is possible that a specially crafted BMP image could cause a denial
of service attack in applications linked against GTK+.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2005-0891 to this issue.



Solution : Get the newest Fedora Updates
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Toshiba OCZ RD400A 512GB M.2 NVMe 2280 SSD with PCIe AIC
$0.99
Toshiba OCZ RD400A 512GB M.2 NVMe 2280 SSD with PCIe AIC pictureSeagate 160Gb SATA 7200rpm 3.5" Hard Drive - ST3160023AS - 9W2814-007
$47.25
Seagate 160Gb SATA 7200rpm 3.5Seagate Dell 120GB SATA 7200rpm 3.5in HDD - ST3120026AS - 9W2813-032
$67.5
Seagate Dell 120GB SATA 7200rpm 3.5in HDD - ST3120026AS - 9W2813-032 pictureSeagate 120Gb SATA 3.5" 7200.7 HDD - ST3120026AS - 9W2813-004
$33.75
Seagate 120Gb SATA 3.5


Discussions

No Discussions have been posted on this vulnerability.