-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                   ESB-2006.0480 -- [UNIX/Linux][RedHat]
                     Moderate: libwmf security update
                               19 July 2006

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              libwmf
Publisher:            Red Hat
Operating System:     Red Hat Enterprise Linux Desktop 4
                      Red Hat Enterprise Linux AS/ES/WS 4
                      UNIX variants (UNIX, Linux, OSX)
Impact:               Execute Arbitrary Code/Commands
Access:               Remote/Unauthenticated
CVE Names:            CVE-2006-3376

Original Bulletin:    https://rhn.redhat.com/errata/RHSA-2006-0597.html

Comment: This advisory references vulnerabilities in products which run on
         platforms other than Red Hat. It is recommended that administrators
         running libwmf check for an updated version of the software for
         their operating system at http://wvware.sourceforge.net/libwmf.html.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: libwmf security update
Advisory ID:       RHSA-2006:0597-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2006-0597.html
Issue date:        2006-07-18
Updated on:        2006-07-18
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2006-3376 
- - ---------------------------------------------------------------------

1. Summary:

Updated libwmf packages that fix a security flaw are now available for Red
Hat Enterprise Linux 4.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

Libwmf is a library for reading and converting Windows MetaFile vector
graphics (WMF).  Libwmf is used by packages such as The GIMP and ImageMagick.

An integer overflow flaw was discovered in libwmf.  An attacker could
create a carefully crafted WMF flaw that could execute arbitrary code if
opened by a victim.  (CVE-2006-3376).

Users of libwmf should update to these packages which contain a backported
security patch to correct this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

198290 - CVE-2006-3376 libwmf integer overflow

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/libwmf-0.2.8.3-5.3.src.rpm
a3351e97473f0af4394b998cd5ff389e  libwmf-0.2.8.3-5.3.src.rpm

i386:
95ce0776b99d34b2305b01d2491c8ff7  libwmf-0.2.8.3-5.3.i386.rpm
130c14ff86120816f2714930fb4c113e  libwmf-debuginfo-0.2.8.3-5.3.i386.rpm
09e45037b62f7463fe722e507078df59  libwmf-devel-0.2.8.3-5.3.i386.rpm

ia64:
95ce0776b99d34b2305b01d2491c8ff7  libwmf-0.2.8.3-5.3.i386.rpm
da0236a75948cccfa9a8534091af47bb  libwmf-0.2.8.3-5.3.ia64.rpm
130c14ff86120816f2714930fb4c113e  libwmf-debuginfo-0.2.8.3-5.3.i386.rpm
22de5d504e134590d17a9dd3e16a643e  libwmf-debuginfo-0.2.8.3-5.3.ia64.rpm
e211c15294c79a83bfcead7abe175bb5  libwmf-devel-0.2.8.3-5.3.ia64.rpm

ppc:
73258f72fc27adf63b5598265a3d41d4  libwmf-0.2.8.3-5.3.ppc.rpm
09a24c35d6711648ef35f81800a7201e  libwmf-0.2.8.3-5.3.ppc64.rpm
386f46b7457bff04b47a0ebe8a0538f9  libwmf-debuginfo-0.2.8.3-5.3.ppc.rpm
90b145052f46530d7fb3bf8b8c45cadd  libwmf-debuginfo-0.2.8.3-5.3.ppc64.rpm
5bf40c54b6ba949f8e02ebb5e13984f0  libwmf-devel-0.2.8.3-5.3.ppc.rpm

s390:
44dac72b0172705871d0c368269e7f9a  libwmf-0.2.8.3-5.3.s390.rpm
e842d2f832410e99328dce18ed54192f  libwmf-debuginfo-0.2.8.3-5.3.s390.rpm
92190ab8c67aa978b499f750d7399ef5  libwmf-devel-0.2.8.3-5.3.s390.rpm

s390x:
44dac72b0172705871d0c368269e7f9a  libwmf-0.2.8.3-5.3.s390.rpm
4429fd7bbc35881cd9f29cc5c2ecda22  libwmf-0.2.8.3-5.3.s390x.rpm
e842d2f832410e99328dce18ed54192f  libwmf-debuginfo-0.2.8.3-5.3.s390.rpm
587093bdd9e438b571479e42a9e9e089  libwmf-debuginfo-0.2.8.3-5.3.s390x.rpm
661d64b1287985b92b22848dcd075887  libwmf-devel-0.2.8.3-5.3.s390x.rpm

x86_64:
95ce0776b99d34b2305b01d2491c8ff7  libwmf-0.2.8.3-5.3.i386.rpm
db3a6a0d9976a0a90e0bcc8318babed3  libwmf-0.2.8.3-5.3.x86_64.rpm
130c14ff86120816f2714930fb4c113e  libwmf-debuginfo-0.2.8.3-5.3.i386.rpm
2ebfbea367681a2c58324f11e61c66d0  libwmf-debuginfo-0.2.8.3-5.3.x86_64.rpm
255efbcafa17355b7d366e77f28ea92e  libwmf-devel-0.2.8.3-5.3.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/libwmf-0.2.8.3-5.3.src.rpm
a3351e97473f0af4394b998cd5ff389e  libwmf-0.2.8.3-5.3.src.rpm

i386:
95ce0776b99d34b2305b01d2491c8ff7  libwmf-0.2.8.3-5.3.i386.rpm
130c14ff86120816f2714930fb4c113e  libwmf-debuginfo-0.2.8.3-5.3.i386.rpm
09e45037b62f7463fe722e507078df59  libwmf-devel-0.2.8.3-5.3.i386.rpm

x86_64:
95ce0776b99d34b2305b01d2491c8ff7  libwmf-0.2.8.3-5.3.i386.rpm
db3a6a0d9976a0a90e0bcc8318babed3  libwmf-0.2.8.3-5.3.x86_64.rpm
130c14ff86120816f2714930fb4c113e  libwmf-debuginfo-0.2.8.3-5.3.i386.rpm
2ebfbea367681a2c58324f11e61c66d0  libwmf-debuginfo-0.2.8.3-5.3.x86_64.rpm
255efbcafa17355b7d366e77f28ea92e  libwmf-devel-0.2.8.3-5.3.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/libwmf-0.2.8.3-5.3.src.rpm
a3351e97473f0af4394b998cd5ff389e  libwmf-0.2.8.3-5.3.src.rpm

i386:
95ce0776b99d34b2305b01d2491c8ff7  libwmf-0.2.8.3-5.3.i386.rpm
130c14ff86120816f2714930fb4c113e  libwmf-debuginfo-0.2.8.3-5.3.i386.rpm
09e45037b62f7463fe722e507078df59  libwmf-devel-0.2.8.3-5.3.i386.rpm

ia64:
95ce0776b99d34b2305b01d2491c8ff7  libwmf-0.2.8.3-5.3.i386.rpm
da0236a75948cccfa9a8534091af47bb  libwmf-0.2.8.3-5.3.ia64.rpm
130c14ff86120816f2714930fb4c113e  libwmf-debuginfo-0.2.8.3-5.3.i386.rpm
22de5d504e134590d17a9dd3e16a643e  libwmf-debuginfo-0.2.8.3-5.3.ia64.rpm
e211c15294c79a83bfcead7abe175bb5  libwmf-devel-0.2.8.3-5.3.ia64.rpm

x86_64:
95ce0776b99d34b2305b01d2491c8ff7  libwmf-0.2.8.3-5.3.i386.rpm
db3a6a0d9976a0a90e0bcc8318babed3  libwmf-0.2.8.3-5.3.x86_64.rpm
130c14ff86120816f2714930fb4c113e  libwmf-debuginfo-0.2.8.3-5.3.i386.rpm
2ebfbea367681a2c58324f11e61c66d0  libwmf-debuginfo-0.2.8.3-5.3.x86_64.rpm
255efbcafa17355b7d366e77f28ea92e  libwmf-devel-0.2.8.3-5.3.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/libwmf-0.2.8.3-5.3.src.rpm
a3351e97473f0af4394b998cd5ff389e  libwmf-0.2.8.3-5.3.src.rpm

i386:
95ce0776b99d34b2305b01d2491c8ff7  libwmf-0.2.8.3-5.3.i386.rpm
130c14ff86120816f2714930fb4c113e  libwmf-debuginfo-0.2.8.3-5.3.i386.rpm
09e45037b62f7463fe722e507078df59  libwmf-devel-0.2.8.3-5.3.i386.rpm

ia64:
95ce0776b99d34b2305b01d2491c8ff7  libwmf-0.2.8.3-5.3.i386.rpm
da0236a75948cccfa9a8534091af47bb  libwmf-0.2.8.3-5.3.ia64.rpm
130c14ff86120816f2714930fb4c113e  libwmf-debuginfo-0.2.8.3-5.3.i386.rpm
22de5d504e134590d17a9dd3e16a643e  libwmf-debuginfo-0.2.8.3-5.3.ia64.rpm
e211c15294c79a83bfcead7abe175bb5  libwmf-devel-0.2.8.3-5.3.ia64.rpm

x86_64:
95ce0776b99d34b2305b01d2491c8ff7  libwmf-0.2.8.3-5.3.i386.rpm
db3a6a0d9976a0a90e0bcc8318babed3  libwmf-0.2.8.3-5.3.x86_64.rpm
130c14ff86120816f2714930fb4c113e  libwmf-debuginfo-0.2.8.3-5.3.i386.rpm
2ebfbea367681a2c58324f11e61c66d0  libwmf-debuginfo-0.2.8.3-5.3.x86_64.rpm
255efbcafa17355b7d366e77f28ea92e  libwmf-devel-0.2.8.3-5.3.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3376
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFEvLqhXlSAg2UNWIIRAo5PAJ9DUKgBVLAJtpdSfWXwDktkg//FWwCfX3r1
M44lFF+SeXi8h//dif+B0zE=
=g7rD
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRL2D0Sh9+71yA2DNAQJZhwP8DhiajcTdpkNt70oDkfvCsW4Im6kclNLH
vTcJDcTvxG8oRg5WGarmu43L0qG6Hc1FoHlQyaWcRU6pTQLLonaX8KEwsf/152f4
iDmkGACgxiT+/Ps2T5MD3vIyPehSB8AZaZebt9Mqb5Ta0AE6o35Da2GYxQ5QVNFl
UFV12VJSAQY=
=Ihtr
-----END PGP SIGNATURE-----