Lucene search

K
debianDebianDEBIAN:DLA-419-1:1FB5B
HistoryFeb 17, 2016 - 10:21 a.m.

[SECURITY] [DLA 419-1] gtk+2.0 security update

2016-02-1710:21:04
lists.debian.org
12

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

6.6 Medium

AI Score

Confidence

High

0.033 Low

EPSS

Percentile

91.4%

Package : gtk+2.0
Version : 2.20.1-2+deb6u1
CVE ID : CVE-2013-7447
Debian Bug : 799275

Gtk+2.0, a graphical user interface library, was susceptible to an integer
overflow in its gdk_cairo_set_source_pixbuf function when allocating a
large block of memory.

For Debian 6 "Squeeze", this issue has been fixed in gtk+2.0 version
2.20.1-2+deb6u1. We recommend you to upgrade your gtk+2.0 packages.

Learn more about the Debian Long Term Support (LTS) Project and how to
apply these updates at: https://wiki.debian.org/LTS/
Attachment:
signature.asc
Description: Digital signature

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

6.6 Medium

AI Score

Confidence

High

0.033 Low

EPSS

Percentile

91.4%