Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
These remote packages are missing security patches :
CVE-2004-0990 described several buffer overflows which had been
discovered in libgd's PNG handling functions. Another update is
required because the update from USN-21-1 was not sufficient to
prevent every possible attack.
If a possible hacker tricks a user into loading a malicious PNG or XPM
image, they could leverage this into executing arbitrary code in the
context of the user opening image.
This vulnerability might lead to privilege escalation in customized
systems that use server applications which link libgd. However, Warty
does not ship such server applications (PHP in Warty uses libgd2 which
was already fixed in USN-25-1).
Upgrade to :
- libgd-dev-1.8.4-36ubuntu0.2 (Ubuntu 4.10)
- libgd-noxpm-dev-1.8.4-36ubuntu0.2 (Ubuntu 4.10)
- libgd-xpm-dev-1.8.4-36ubuntu0.2 (Ubuntu 4.10)
- libgd1-1.8.4-36ubuntu0.2 (Ubuntu 4.10)
- libgd1-noxpm-1.8.4-36ubuntu0.2 (Ubuntu 4.10)
- libgd1-xpm-1.8.4-36ubuntu0.2 (Ubuntu 4.10)
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi
|Acer Iconia Tablet Cortex A53 MT8163 Quad-Core 1.3GHz 1GB Ram 16GB Flash Android
|USB 2.0 U Disk 8GB USB Flash Drive usb flash disk 8gb Black
|Lexar JumpDrive S45 32GB USB 3.0 Flash Drive - LJDS45-32GABNL (Blue) ..
|Patriot Memory Stellar-C USB 3.1/Type-C Flash Drives PIF32GSTRCOTG
No Discussions have been posted on this vulnerability.