Lucene search

K
osvGoogleOSV:DSA-1743-1
HistoryMar 17, 2009 - 12:00 a.m.

libtk-img - arbitrary code execution

2009-03-1700:00:00
Google
osv.dev
9

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.343 Low

EPSS

Percentile

96.5%

Two buffer overflows have been found in the GIF image parsing code of
Tk, a cross-platform graphical toolkit, which could lead to the execution
of arbitrary code. The Common Vulnerabilities and Exposures project
identifies the following problems:

  • CVE-2007-5137
    It was discovered that libtk-img is prone to a buffer overflow via
    specially crafted multi-frame interlaced GIF files.
  • CVE-2007-5378
    It was discovered that libtk-img is prone to a buffer overflow via
    specially crafted GIF files with certain subimage sizes.

For the stable distribution (lenny), these problems have been fixed in
version 1.3-release-7+lenny1.

For the oldstable distribution (etch), these problems have been fixed in
version 1.3-15etch3.

For the testing distribution (squeeze) and the unstable distribution
(sid), these problems have been fixed in version 1.3-release-8.

We recommend that you upgrade your libtk-img packages.

CPENameOperatorVersion
libtk-imgeq1:1.3-release-7

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.343 Low

EPSS

Percentile

96.5%