Lucene search

K
debianDebianDEBIAN:DSA-608-1:FA628
HistoryDec 14, 2004 - 10:36 a.m.

[SECURITY] [DSA 608-1] New zgv packages fix arbitrary code execution

2004-12-1410:36:45
lists.debian.org
7

0.12 Low

EPSS

Percentile

95.4%


Debian Security Advisory DSA 608-1 [email protected]
http://www.debian.org/security/ Martin Schulze
December 14th, 2004 http://www.debian.org/security/faq


Package : zgv
Vulnerability : integer overflows, unsanitised input
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2004-1095 CAN-2004-0999
BugTraq ID : 11556

Several vulnerabilities have been discovered in zgv, an SVGAlib
graphics viewer for the i386 architecture. The Common Vulnerabilities
and Exposures Project identifies the following problems:

CAN-2004-1095

Luke Macken and "infamous41md" independently discoverd multiple
integer overflows in zgv.  Remote exploitation of an integer
overflow vulnerability could allow the execution of arbitrary
code.

CAN-2004-0999

Mikulas Patocka discovered that malicious multiple-image (e.g.
animated) GIF images can cause a segmentation fault in zgv.

For the stable distribution (woody) these problems have been fixed in
version 5.5-3woody1.

For the unstable distribution (sid) these problems will be fixed soon.

We recommend that you upgrade your zgv package immediately.

Upgrade Instructions


wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

http://security.debian.org/pool/updates/main/z/zgv/zgv_5.5-3woody2.dsc
  Size/MD5 checksum:      601 f6114a026863db918a6bd9a6cc201a97
http://security.debian.org/pool/updates/main/z/zgv/zgv_5.5-3woody2.diff.gz
  Size/MD5 checksum:     8541 f501ad407808235577b2bc746ddfe4e6
http://security.debian.org/pool/updates/main/z/zgv/zgv_5.5.orig.tar.gz
  Size/MD5 checksum:   329235 629386a4df72f6ec007319bf12db1374

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/z/zgv/zgv_5.5-3woody2_i386.deb
  Size/MD5 checksum:   211772 36e675c74bafb546e5f6fb0da36385c3

These files will probably be moved into the stable distribution on
its next update.


For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: [email protected]
Package info: `apt-cache show <pkg>' and http://packages.debian.org/&lt;pkg&gt;

OSVersionArchitecturePackageVersionFilename
Debian3allzgv< 5.5-3woody1zgv_5.5-3woody1_all.deb

0.12 Low

EPSS

Percentile

95.4%