Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: New netpbm-free packages fix arbitrary code execution Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian A vulnerability was discovered in the GIF reader implementation in netpbm-free, a suite of image manipulation utilities. Insufficient input data validation could allow a maliciously-crafted GIF file to overrun a stack buffer, potentially permitting the execution of arbitrary code.
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1579-1                                   Devin Carraway
May 18, 2008                
- ------------------------------------------------------------------------

Package        : netpbm-free
Vulnerability  : insufficient input sanitizing
Problem type   : local (remote)
Debian-specific: no
CVE Id(s)      : CVE-2008-0554

A vulnerability was discovered in the GIF reader implementation in
netpbm-free, a suite of image manipulation utilities.  Insufficient
input data validation could allow a maliciously-crafted GIF file
to overrun a stack buffer, potentially permitting the execution of
arbitrary code.

For the stable distribution (etch), these problems have been fixed in
version 2:10.0-11.1+etch1.

For the unstable distribution (sid), these problems were fixed in
version 2:10.0-11.1.

We recommend that you upgrade your netpbm packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:
    Size/MD5 checksum:    49833 5e340881bb56e88ca2525c5baf3a12cf
    Size/MD5 checksum:  1926538 985e9f6d531ac0b2004f5cbebdeea87d
    Size/MD5 checksum:      755 e8b82a4cab1e4352faf53d6093ff02d1

alpha architecture (DEC Alpha)
    Size/MD5 checksum:    84206 b33236e6b1bfd895231905579583ec1c
    Size/MD5 checksum:   139256 4dde0418859c0a44e8abbd5a8888bc97
    Size/MD5 checksum:    75730 5ba8dac319fcb09e6057edcf339031da
    Size/MD5 checksum:  1423650 928d158de222f0aad537d2e9d5a55d1c
    Size/MD5 checksum:   138864 d72de0e9205fafc74ed5a61574f90a89

amd64 architecture (AMD x86_64 (AMD64))
    Size/MD5 checksum:    75412 c87cf158e0234259584f584a9f1832b5
    Size/MD5 checksum:  1241558 470cca7fe0cafa9a3ef519e45911989f
    Size/MD5 checksum:   116838 1444d40f6022a1650c8ebcf5041ba6ef
    Size/MD5 checksum:    67404 c11ac33a59b828227df65f030d4b0ecd
    Size/MD5 checksum:   117288 aa57bddc977bfcaae40c4d2e0dfab247

arm architecture (ARM)
    Size/MD5 checksum:    62288 4f73d9da53ef5fca46b720787b69a937
    Size/MD5 checksum:  1260142 3aad360491069ca71cb1fd79a54047b3
    Size/MD5 checksum:   109834 a9b24a209be2c2a05183d5a501981669
    Size/MD5 checksum:    68692 02d48f5f058f67b7d2007332c214211d
    Size/MD5 checksum:   110104 7e35448f17f029ad74902589aae0c0c5

hppa architecture (HP PA RISC)
    Size/MD5 checksum:  1333920 a56ad3bc6edba6f0c8aeeb90a05b24ae
    Size/MD5 checksum:    82594 68fa87cdf4869bc89047fe0ad48cb1cf
    Size/MD5 checksum:   125684 7df0ea27cbd816e3c4846bd4714907c4
    Size/MD5 checksum:   125788 49bdc7c577ccfee26adfd44187e7098d
    Size/MD5 checksum:    73896 5cd54f6760f1d0a74899aa5b1eeeefee

i386 architecture (Intel ia32)
    Size/MD5 checksum:    63758 f905f22588b614831324060426e5751d
    Size/MD5 checksum:  1181300 365c86b4233a807c3c6c10f800da4afa
    Size/MD5 checksum:    70202 591a522cb5cc225858e8ef59c0b0229e
    Size/MD5 checksum:   109860 c1011f89b554328ff82cd01451e667c1
    Size/MD5 checksum:   109718 c1130da9304e855827b99d4c2202a5b2

ia64 architecture (Intel ia64)
    Size/MD5 checksum:   101310 e695256a27385dee8fb2f8ddf1ccb151
    Size/MD5 checksum:    92042 a2df3ed51d279ad0191401d7db0a29de
    Size/MD5 checksum:  1759566 1f58b0302e2394d09bf3fcc423ee77ec
    Size/MD5 checksum:   149610 8458ab3ca7477d7011b815e31651a74a
    Size/MD5 checksum:   149986 dc3f0e6f5e4511c5970a0bcd726d8f3b

mips architecture (MIPS (Big Endian))
    Size/MD5 checksum:   124128 fad3edf3cf23f0bf7d13660bbb02795e
    Size/MD5 checksum:   123212 5331c9d21f4e49029a2d6afc8e88fbcd
    Size/MD5 checksum:    73522 ff8075e6113bf9f387798a142c8d07a8
    Size/MD5 checksum:  1318050 688e833af5f7ed3dcaf6c8b803acab6b
    Size/MD5 checksum:    65826 f6f9b8c34d1fc3ecb332baf87144cc67

mipsel architecture (MIPS (Little Endian))
    Size/MD5 checksum:   123410 7e7c4c3649a11e6c5d2bac60511a2608
    Size/MD5 checksum:    65710 dff78e7f50f68e0e942323af94c69af5
    Size/MD5 checksum:  1297700 ed5a3f2a53460072beae27697d68bb31
    Size/MD5 checksum:    72604 b5a39f3389ede6a53b330e761db9d0e8
    Size/MD5 checksum:   123830 2593cde97437a5d9c33ac978a948bbeb

powerpc architecture (PowerPC)
    Size/MD5 checksum:   119758 e917d3ac53867792653b8a7d2d090824
    Size/MD5 checksum:    79014 ee2fd0a785658b116b877f951b8e1531
    Size/MD5 checksum:  1448810 c24163baecf73aa5452954e1f4c04b05
    Size/MD5 checksum:   119366 26fc1ef0d6d24cc8c0ea956b9cc12f9c
    Size/MD5 checksum:    68122 8ef7a20dc73a9e293cf5b15bf33ead0d

s390 architecture (IBM S/390)
    Size/MD5 checksum:  1245934 825184a22f4476b277cade23ec93cbf5
    Size/MD5 checksum:    76472 005fc9caafb6eb047701e3f5272d0bbe
    Size/MD5 checksum:   114788 ba4a56d368c612f161f3e0c983e98bd6
    Size/MD5 checksum:   115006 4c1b4a388455a0725771dfb5c73f8ddc
    Size/MD5 checksum:    69900 bf8bf3369a29c340eb035413034cccae

sparc architecture (Sun SPARC/UltraSPARC)
    Size/MD5 checksum:   111782 e2553ed79f836d8fa1dc25422ba8aa95
    Size/MD5 checksum:    68808 4ee6c9653cd560ec0074275b457202b7
    Size/MD5 checksum:   111562 e126024c8567d3140c240e60ecc390dc
    Size/MD5 checksum:  1204234 85d633a743c51efea0122caa7e12c6ea
    Size/MD5 checksum:    62992 efe34ea795e4c875ab65c28f413a590f

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Feds Charged With Stealing Money During Silk Road Investigation
EFF questions US government's software flaw disclosure policy
Hotel Router Vulnerability A Reminder Of Untrusted WiFi Risks
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.