|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200412-17] kfax: Multiple overflows in the included TIFF library Vulnerability Assessment Details
|
[GLSA-200412-17] kfax: Multiple overflows in the included TIFF library |
||
kfax: Multiple overflows in the included TIFF library Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200412-17 (kfax: Multiple overflows in the included TIFF library) Than Ngo discovered that kfax contains a private copy of the TIFF library and is therefore subject to several known vulnerabilities (see References). Impact A remote attacker could entice a user to view a carefully-crafted TIFF image file with kfax, which would potentially lead to execution of arbitrary code with the rights of the user running kfax. Workaround The KDE Team recommends to remove the kfax binary as well as the kfaxpart.la KPart: rm /usr/kde/3.*/lib/kde3/kfaxpart.la rm /usr/kde/3.*/bin/kfax Note: This will render the kfax functionality useless, if kfax functionality is needed you should upgrade to the KDE 3.3.2 which is not stable at the time of this writing. There is no known workaround at this time. References: http://www.kde.org/info/security/advisory-20041209-2.txt http://www.gentoo.org/security/en/glsa/glsa-200410-11.xml http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0803 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0804 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0886 Solution: All kfax users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.3.2" Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
SonicWall TZ370 Network Security Appliance Firewall (02-SSC-2825)-Open Box
$199.95
SonicWall TZ270 High Availability Firewall Security (02-SSC-6447) - Open Box
$99.95
Untangle Z4 Industrial Firewall - Fully Functional, PFSense OpenSense
$99.99
Palo Alto PA-220 Next-Gen Firewall 520-000309-00J
$40.00
Firewalla: Cyber Security Firewall for Home & Business, Protect Network
$199.99
OPNsense, pfSense, Gigabit Firewall + Router + VPN, 16GB RAM, 120GB SSD, 6 Ports
$184.99
Sophos Network Appliance XG 115 Rev 3 Firewall Desktop Security - No Power Cable
$59.99
Fortinet Fortigate-61e Security Firewall Appliance No AC Adapter/SSD
$32.99
$83.80
FORTINET FORTIGATE 40F Next GEN Firewall Security REGISTERED (FG-40F)-Open Box
$154.95
|
||
No Discussions have been posted on this vulnerability. |