Lucene search

K
gentooGentoo FoundationGLSA-200904-02
HistoryApr 03, 2009 - 12:00 a.m.

GLib: Execution of arbitrary code

2009-04-0300:00:00
Gentoo Foundation
security.gentoo.org
14

4.6 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

34.7%

Background

The GLib is a library of C routines that is used by a multitude of programs.

Description

Diego E. Petteno` reported multiple integer overflows in glib/gbase64.c when converting a long string from or to a base64 representation.

Impact

A remote attacker could entice a user or automated system to perform a base64 conversion via an application using GLib, possibly resulting in the execution of arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All GLib 2.18 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.18.4-r1"

All GLib 2.16 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.16.6-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-libs/glib<Β 2.18.4-r1UNKNOWN

4.6 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

34.7%