Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the gtk+2.0 package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory MDKSA-2007:039 (gtk+2.0).
The GdkPixbufLoader function in GIMP ToolKit (GTK+) in GTK 2 (gtk2)
permits context-dependent attackers to cause a denial of service (crash)
via a malformed image file. (CVE-2007-0010)
The version of libgtk+2.0 shipped with Mandriva Linux 2007 fails
various portions of the lsb-test-desktop test suite, part of LSB 3.1
The updated packages also address the following issues:
The Home and Desktop entries in the GTK File Chooser are not always
GTK+-based applications (which includes all the Mandriva Linux
configuration tools, for example) crash (instead of falling back to the
default theme) when an invalid icon theme is selected. (#27013)
Additional patches from GNOME CVS have been included to address the
following issues from the GNOME bugzilla:
* 357132 - fix RGBA colormap issue
* 359537,357280,359052 - fix various printer bugs
* 357566,353736,357050,363437,379503 - fix various crashes
* 372527 - fix fileselector bug +
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2007:039
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security
|ProCase New iPad 9.7 Case 2017 - Vintage Folio Stand Cover for Apple inch,...
|New Sealed VTG 1992 Apple Mac SCSI Active Terminator Part M3503LL/A
| APPLE SPECLIALIST LARGE 24" X 20" WINDOW DECAL STEVE JOBS ERA Vintage
|Vintage CPU Apple PowerMac CPU 100MHz 630-1219-A 820-0611
No Discussions have been posted on this vulnerability.