|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 3 2005-1087: gtk2 Vulnerability Assessment Details
|
Fedora Core 3 2005-1087: gtk2 |
||
Check for the version of the gtk2 package Detailed Explanation for this Vulnerability Assessment The remote host is missing the patch for the advisory FEDORA-2005-1087 (gtk2). GTK+ is a multi-platform toolkit for creating graphical user interfaces. Offering a complete set of widgets, GTK+ is suitable for projects ranging from small one-off tools to complete application suites. Update Information: The gtk2 package contains the GIMP ToolKit (GTK+), a library for creating graphical user interfaces for the X Window System. A bug was found in the way gtk2 processes XPM images. An attacker could create a carefully crafted XPM file in such a way that it could cause an application linked with gtk2 to execute arbitrary code when the file was opened by a victim. The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-3186 to this issue. Ludwig Nussel discovered an infinite-loop denial of service bug in the way gtk2 processes XPM images. A possible hacker could create a carefully crafted XPM file in such a way that it could cause an application linked with gtk2 to stop responding when the file was opened by a victim. The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-2975 to this issue. Users of gtk2 are advised to upgrade to these updated packages, which contain backported patches and are not vulnerable to these issues. Solution : Get the newest Fedora Updates Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security |
||
Cables, Connectors |
Vintage ATARI MEGA ST 2 POWERS ON
$139.99
Vintage Atari 400 Computer System w/ Atari 410 Program Recorder
$110.00
Atari 1050 5.25" Floppy Disk Drive w/ CO17945 Power Adaptor - Powers On
$49.99
Atari 1090XL Reproduction Main Board with two cards.
$249.42
Atari 400/800/XL/XE Computer SIO2PC - PC/Mac Disk Drive Emulator Adapter/Device
$15.25
Atari 130xe Computer Case (no keyboard, no motheboard)
$40.00
Atari FujiNet 800/XL/XE/XEGS (Devkit Version using 8 MB ESP32-DevKitC-VE board)
$58.00
Atari 600XL Computer Bundle TESTED WORKING With Cassette Recorder Atariwriter
$161.95
A8picoCart Atari 130 / 65 XE 800 / 1200 XL XEGS multicart UnoCart clone game
$32.95
Atari 800xl E X C E L L E N T condition. Atarimax with Games
$250.00
|
||
No Discussions have been posted on this vulnerability. |