Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200608-22] fbida: Arbitrary command execution


Vulnerability Assessment Details

[GLSA-200608-22] fbida: Arbitrary command execution

Vulnerability Assessment Summary
fbida: Arbitrary command execution

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200608-22
(fbida: Arbitrary command execution)


Toth Andras has discovered a typographic mistake in the "fbgs" script,
shipped with fbida if the "fbcon" and "pdf" USE flags are both enabled.
This script runs "gs" without the -dSAFER option, thus permiting a
PostScript file to execute, delete or create any kind of file on the
system.

Impact

A remote attacker can entice a vulnerable user to view a malicious
PostScript or PDF file with fbgs, which may result with the execution
of arbitrary code.

Workaround

There is no known workaround at this time.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3119


Solution:
All fbida users with the "fbcon" and "pdf" USE flags both enabled
should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-gfx/fbida-2.03-r4"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2006 Michel Arboi

Cables, Connectors

Hedgren Mainframe Laptop Attache, 13-inch Black - NEW -
$23.99
Hedgren Mainframe Laptop Attache, 13-inch Black - NEW -  pictureVintage 1988 Mainframe Computer Abend Dump 63 pages CICS
$44.0
Vintage 1988 Mainframe Computer Abend Dump 63 pages CICS picturePeavey MM980NT Architectural Acoustics Mainframe Media Matrix CPU
$99.99
Peavey MM980NT Architectural Acoustics Mainframe Media Matrix CPU pictureMac 3270 - Macintosh to Mainframe Software by Simware - Manual and Sealed Discs
$29.95
Mac 3270 - Macintosh to Mainframe Software by Simware - Manual and Sealed Discs picture


Discussions

No Discussions have been posted on this vulnerability.