Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
These remote packages are missing security patches :
CVE-2004-0990 described several buffer overflows which had been
discovered in libgd's PNG handling functions. Another update is
required because the update from USN-21-1 was not sufficient to
prevent every possible attack.
If a possible hacker tricks a user into loading a malicious PNG or XPM
image, they could leverage this into executing arbitrary code in the
context of the user opening image.
This vulnerability might lead to privilege escalation in customized
systems that use server applications which link libgd. However, Warty
does not ship such server applications (PHP in Warty uses libgd2 which
was already fixed in USN-25-1).
Upgrade to :
- libgd-dev-1.8.4-36ubuntu0.2 (Ubuntu 4.10)
- libgd-noxpm-dev-1.8.4-36ubuntu0.2 (Ubuntu 4.10)
- libgd-xpm-dev-1.8.4-36ubuntu0.2 (Ubuntu 4.10)
- libgd1-1.8.4-36ubuntu0.2 (Ubuntu 4.10)
- libgd1-noxpm-1.8.4-36ubuntu0.2 (Ubuntu 4.10)
- libgd1-xpm-1.8.4-36ubuntu0.2 (Ubuntu 4.10)
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi
|SUPERMICRO MBD-X11SSH-F-O Micro ATX Server Motherboard LGA 1151 Intel C236
|super-micro server motherboard X7DBE Rev 2.0, 2x Xeon L5420 CPU, 32 Gig PC2-5300
|Sun Micro Sun Blade 2500 Does Not Boot
|Sun Micro Sun Fire V250 Parts
No Discussions have been posted on this vulnerability.