Debian Security Advisory DSA 1415-1 (tk8.4) mentions insufficient input validation in code used to load GIF images, leading to arbitrary code execution. Upgrade tk8.4 packages
Reporter | Title | Published | Views | Family All 80 |
---|---|---|---|---|
![]() | [SECURITY] [DSA 1415-1] New tk8.4 packages fix arbitrary code execution | 27 Nov 200720:51 | – | debian |
![]() | [SECURITY] [DSA 1416-1] New tk8.3 packages fix arbitrary code execution | 27 Nov 200720:56 | – | debian |
![]() | [SECURITY] [DSA 1743-1] New libtk-img packages fix arbitrary code execution | 17 Mar 200908:52 | – | debian |
![]() | Debian: Security Advisory (DSA-1416-1) | 8 Mar 202300:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-1415-1) | 17 Jan 200800:00 | – | openvas |
![]() | Solaris Update for tk 137871-02 | 3 Jun 200900:00 | – | openvas |
![]() | Solaris Update for tk 137872-02 | 3 Jun 200900:00 | – | openvas |
![]() | CentOS Update for tk CESA-2008:0135 centos4 x86_64 | 27 Feb 200900:00 | – | openvas |
![]() | Solaris Update for tk 137871-02 | 3 Jun 200900:00 | – | openvas |
![]() | Solaris Update for tk 137911-02 | 3 Jun 200900:00 | – | openvas |
# OpenVAS Vulnerability Test
# $Id: deb_1415_1.nasl 6616 2017-07-07 12:10:49Z cfischer $
# Description: Auto-generated from advisory DSA 1415-1
#
# Authors:
# Thomas Reinke <[email protected]>
#
# Copyright:
# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com
# Text descriptions are largerly excerpted from the referenced
# advisory, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
include("revisions-lib.inc");
tag_insight = "It was discovered that Tk, a cross-platform graphical toolkit for Tcl
performs insufficient input validation in the code used to load GIF
images, which may lead to the execution of arbitrary code.
For the stable distribution (etch), this problem has been fixed in
version 8.4.12-1etch1.
For the old stable distribution (sarge), this problem has been fixed
in version 8.4.9-1sarge1.
We recommend that you upgrade your tk8.4 packages. Updated packages for";
tag_summary = "The remote host is missing an update to tk8.4
announced via advisory DSA 1415-1.";
tag_solution = "https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201415-1";
if(description)
{
script_id(59640);
script_version("$Revision: 6616 $");
script_tag(name:"last_modification", value:"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $");
script_tag(name:"creation_date", value:"2008-01-17 23:23:47 +0100 (Thu, 17 Jan 2008)");
script_cve_id("CVE-2007-5378");
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:N/A:P");
script_name("Debian Security Advisory DSA 1415-1 (tk8.4)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com");
script_family("Debian Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages");
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "summary" , value : tag_summary);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
#
# The script code starts here
#
include("pkg-lib-deb.inc");
res = "";
report = "";
if ((res = isdpkgvuln(pkg:"tk8.4-doc", ver:"8.4.12-1etch1", rls:"DEB3.1")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"tk8.4-dev", ver:"8.4.12-1etch1", rls:"DEB3.1")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"tk8.4", ver:"8.4.12-1etch1", rls:"DEB3.1")) != NULL) {
report += res;
}
if (report != "") {
security_message(data:report);
} else if (__pkg_match) {
exit(99); # Not vulnerable.
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo