Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2005.0923 -- RHSA-2005:811-01 Important: gtk2 security update 16 November 2005 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: gtk2 Publisher: Red Hat Operating System: Red Hat Enterprise Linux Desktop 4 Red Hat Enterprise Linux AS/ES/WS 4 Red Hat Desktop 3 Red Hat Enterprise Linux AS/ES/WS 3 Red Hat Linux Advanced Workstation 2.1 Red Hat Enterprise Linux AS/ES/WS 2.1 UNIX variants Impact: Execute Arbitrary Code/Commands Denial of Service Access: Remote/Unauthenticated CVE Names: CVE-2005-3186 CVE-2005-2975 Ref: ESB-2005.0922 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2005-811.html Comment: This advisory references vulnerabilities in products which run on platforms other than Red Hat. It is recommended that administrators running gtk2 check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Important: gtk2 security update Advisory ID: RHSA-2005:811-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-811.html Issue date: 2005-11-15 Updated on: 2005-11-15 Product: Red Hat Enterprise Linux CVE Names: CVE-2005-3186 CVE-2005-2975 - - --------------------------------------------------------------------- 1. Summary: Updated gtk2 packages that fix two security issues are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: The gtk2 package contains the GIMP ToolKit (GTK+), a library for creating graphical user interfaces for the X Window System. A bug was found in the way gtk2 processes XPM images. An attacker could create a carefully crafted XPM file in such a way that it could cause an application linked with gtk2 to execute arbitrary code when the file was opened by a victim. The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-3186 to this issue. Ludwig Nussel discovered an infinite-loop denial of service bug in the way gtk2 processes XPM images. An attacker could create a carefully crafted XPM file in such a way that it could cause an application linked with gtk2 to stop responding when the file was opened by a victim. The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-2975 to this issue. Users of gtk2 are advised to upgrade to these updated packages, which contain backported patches and are not vulnerable to these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 171073 - CVE-2005-3186 XPM buffer overflow 171904 - CVE-2005-2975 gtk2 XPM DoS 6. RPMs required: Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/gtk2-2.2.4-19.src.rpm 2beebc30bf5b45b0c2dc6d1261b67561 gtk2-2.2.4-19.src.rpm i386: 7c4100ec2705bdd6ce1c2e494e6d7295 gtk2-2.2.4-19.i386.rpm c7fd878b56e54635eb842eb2ff72840a gtk2-devel-2.2.4-19.i386.rpm ia64: 7c4100ec2705bdd6ce1c2e494e6d7295 gtk2-2.2.4-19.i386.rpm e6e0623450c1ad48ecf4f8b145bcc3b7 gtk2-2.2.4-19.ia64.rpm 38510603379a0018f524f1d4f1fab979 gtk2-devel-2.2.4-19.ia64.rpm ppc: 1ffb585f9a10954d9447c8fbcb580065 gtk2-2.2.4-19.ppc.rpm 4d4b6cc89f7721e088d31403cb250b2c gtk2-2.2.4-19.ppc64.rpm e89f8a6c2f59762d256a7f98db702345 gtk2-devel-2.2.4-19.ppc.rpm s390: 0610f7c6ea96609ec70f042fe54f76d7 gtk2-2.2.4-19.s390.rpm c3ea0a99a0e5dbe7727442cab31aa735 gtk2-devel-2.2.4-19.s390.rpm s390x: 0610f7c6ea96609ec70f042fe54f76d7 gtk2-2.2.4-19.s390.rpm 4ef78cf2393365df26bce2e0690fe9ca gtk2-2.2.4-19.s390x.rpm 5f30d8dc16ee803ad9b49465b592f738 gtk2-devel-2.2.4-19.s390x.rpm x86_64: 7c4100ec2705bdd6ce1c2e494e6d7295 gtk2-2.2.4-19.i386.rpm f60a3e69986ad825cba4aad1254863ce gtk2-2.2.4-19.x86_64.rpm 5600f666987f01f84450c5afd5b4b755 gtk2-devel-2.2.4-19.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/gtk2-2.2.4-19.src.rpm 2beebc30bf5b45b0c2dc6d1261b67561 gtk2-2.2.4-19.src.rpm i386: 7c4100ec2705bdd6ce1c2e494e6d7295 gtk2-2.2.4-19.i386.rpm c7fd878b56e54635eb842eb2ff72840a gtk2-devel-2.2.4-19.i386.rpm x86_64: 7c4100ec2705bdd6ce1c2e494e6d7295 gtk2-2.2.4-19.i386.rpm f60a3e69986ad825cba4aad1254863ce gtk2-2.2.4-19.x86_64.rpm 5600f666987f01f84450c5afd5b4b755 gtk2-devel-2.2.4-19.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/gtk2-2.2.4-19.src.rpm 2beebc30bf5b45b0c2dc6d1261b67561 gtk2-2.2.4-19.src.rpm i386: 7c4100ec2705bdd6ce1c2e494e6d7295 gtk2-2.2.4-19.i386.rpm c7fd878b56e54635eb842eb2ff72840a gtk2-devel-2.2.4-19.i386.rpm ia64: 7c4100ec2705bdd6ce1c2e494e6d7295 gtk2-2.2.4-19.i386.rpm e6e0623450c1ad48ecf4f8b145bcc3b7 gtk2-2.2.4-19.ia64.rpm 38510603379a0018f524f1d4f1fab979 gtk2-devel-2.2.4-19.ia64.rpm x86_64: 7c4100ec2705bdd6ce1c2e494e6d7295 gtk2-2.2.4-19.i386.rpm f60a3e69986ad825cba4aad1254863ce gtk2-2.2.4-19.x86_64.rpm 5600f666987f01f84450c5afd5b4b755 gtk2-devel-2.2.4-19.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/gtk2-2.2.4-19.src.rpm 2beebc30bf5b45b0c2dc6d1261b67561 gtk2-2.2.4-19.src.rpm i386: 7c4100ec2705bdd6ce1c2e494e6d7295 gtk2-2.2.4-19.i386.rpm c7fd878b56e54635eb842eb2ff72840a gtk2-devel-2.2.4-19.i386.rpm ia64: 7c4100ec2705bdd6ce1c2e494e6d7295 gtk2-2.2.4-19.i386.rpm e6e0623450c1ad48ecf4f8b145bcc3b7 gtk2-2.2.4-19.ia64.rpm 38510603379a0018f524f1d4f1fab979 gtk2-devel-2.2.4-19.ia64.rpm x86_64: 7c4100ec2705bdd6ce1c2e494e6d7295 gtk2-2.2.4-19.i386.rpm f60a3e69986ad825cba4aad1254863ce gtk2-2.2.4-19.x86_64.rpm 5600f666987f01f84450c5afd5b4b755 gtk2-devel-2.2.4-19.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/gtk2-2.4.13-18.src.rpm 319e84b7ef7333e0fa701a82321f27d6 gtk2-2.4.13-18.src.rpm i386: 38fc94c08b8709088f1faa742c598d1e gtk2-2.4.13-18.i386.rpm 66f404a4f92b1d8edf4b7fe52efa7a95 gtk2-devel-2.4.13-18.i386.rpm ia64: 38fc94c08b8709088f1faa742c598d1e gtk2-2.4.13-18.i386.rpm e28a842bdc3df5ad91a871e5bf37830b gtk2-2.4.13-18.ia64.rpm 6253d039252a0e032535eaf0bc980c45 gtk2-devel-2.4.13-18.ia64.rpm ppc: b8c74bd45ff3029778dbb4dacf81cb77 gtk2-2.4.13-18.ppc.rpm 267defc507f889c498f9f79bfd062175 gtk2-2.4.13-18.ppc64.rpm f0c599f36e0ac42b4f6c10c95b248833 gtk2-devel-2.4.13-18.ppc.rpm s390: 7c83feddd2b894f7dc5dd0694c6ffb46 gtk2-2.4.13-18.s390.rpm 91f83cb635117c6600f025782f1ab59d gtk2-devel-2.4.13-18.s390.rpm s390x: 7c83feddd2b894f7dc5dd0694c6ffb46 gtk2-2.4.13-18.s390.rpm 23bf1c1628f0be7fb9efac948ad135be gtk2-2.4.13-18.s390x.rpm c4d4fb513d4ff47cae9dd4935bc3b3f0 gtk2-devel-2.4.13-18.s390x.rpm x86_64: 38fc94c08b8709088f1faa742c598d1e gtk2-2.4.13-18.i386.rpm 0e1c475684a72b6230eef4d1355bbeca gtk2-2.4.13-18.x86_64.rpm 62fb0870357cd572bbdf2988005f388b gtk2-devel-2.4.13-18.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/gtk2-2.4.13-18.src.rpm 319e84b7ef7333e0fa701a82321f27d6 gtk2-2.4.13-18.src.rpm i386: 38fc94c08b8709088f1faa742c598d1e gtk2-2.4.13-18.i386.rpm 66f404a4f92b1d8edf4b7fe52efa7a95 gtk2-devel-2.4.13-18.i386.rpm x86_64: 38fc94c08b8709088f1faa742c598d1e gtk2-2.4.13-18.i386.rpm 0e1c475684a72b6230eef4d1355bbeca gtk2-2.4.13-18.x86_64.rpm 62fb0870357cd572bbdf2988005f388b gtk2-devel-2.4.13-18.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/gtk2-2.4.13-18.src.rpm 319e84b7ef7333e0fa701a82321f27d6 gtk2-2.4.13-18.src.rpm i386: 38fc94c08b8709088f1faa742c598d1e gtk2-2.4.13-18.i386.rpm 66f404a4f92b1d8edf4b7fe52efa7a95 gtk2-devel-2.4.13-18.i386.rpm ia64: 38fc94c08b8709088f1faa742c598d1e gtk2-2.4.13-18.i386.rpm e28a842bdc3df5ad91a871e5bf37830b gtk2-2.4.13-18.ia64.rpm 6253d039252a0e032535eaf0bc980c45 gtk2-devel-2.4.13-18.ia64.rpm x86_64: 38fc94c08b8709088f1faa742c598d1e gtk2-2.4.13-18.i386.rpm 0e1c475684a72b6230eef4d1355bbeca gtk2-2.4.13-18.x86_64.rpm 62fb0870357cd572bbdf2988005f388b gtk2-devel-2.4.13-18.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/gtk2-2.4.13-18.src.rpm 319e84b7ef7333e0fa701a82321f27d6 gtk2-2.4.13-18.src.rpm i386: 38fc94c08b8709088f1faa742c598d1e gtk2-2.4.13-18.i386.rpm 66f404a4f92b1d8edf4b7fe52efa7a95 gtk2-devel-2.4.13-18.i386.rpm ia64: 38fc94c08b8709088f1faa742c598d1e gtk2-2.4.13-18.i386.rpm e28a842bdc3df5ad91a871e5bf37830b gtk2-2.4.13-18.ia64.rpm 6253d039252a0e032535eaf0bc980c45 gtk2-devel-2.4.13-18.ia64.rpm x86_64: 38fc94c08b8709088f1faa742c598d1e gtk2-2.4.13-18.i386.rpm 0e1c475684a72b6230eef4d1355bbeca gtk2-2.4.13-18.x86_64.rpm 62fb0870357cd572bbdf2988005f388b gtk2-devel-2.4.13-18.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2005 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFDefTDXlSAg2UNWIIRAlYxAJwIIcBk9FfWOLP7+7v46Zct58INrQCfZE4B kTFxVq5XySXMrwJglCWQTRY= =gvN+ - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBQ3rCPyh9+71yA2DNAQK38AP+M1Nkh/ykUz33MsprWZngxYXCfKsqXI5H Mb+qNITVkk82H+ZzFhrbyiprdpKQPj967Gmvtn/+5tbJ2JVPaZ6e5MqKxMbEHUaW nMiGPYQjoBhNTWV3BGtcTrGvUECC2JhBMgExtMP3oHsMe1hI/g8AoKJDoUrSYbDY qYZFvBO8yo8= =rvem -----END PGP SIGNATURE-----