Movatterモバイル変換


[0]ホーム

URL:


Home page logo
bugtraq logo

Bugtraqmailing list archives

PreviousBy DateNext
PreviousBy ThreadNext

[ GLSA 200501-11 ] Dillo: Format string vulnerability


From: Thierry Carrez <koon () gentoo org>
Date: Sun, 09 Jan 2005 23:08:19 +0100

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -Gentoo Linux Security Advisory                           GLSA 200501-11- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -http://security.gentoo.org/- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -  Severity: Normal     Title: Dillo: Format string vulnerability      Date: January 09, 2005      Bugs: #76665        ID: 200501-11- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -Synopsis========Dillo is vulnerable to a format string bug, which may result in theexecution of arbitrary code.Background==========Dillo is a small and fast multi-platform web browser based on GTK+.Affected packages=================    -------------------------------------------------------------------     Package           /  Vulnerable  /                     Unaffected    -------------------------------------------------------------------  1  www-client/dillo     < 0.8.3-r4                       >= 0.8.3-r4Description===========Gentoo Linux developer Tavis Ormandy found a format string bug inDillo's handling of messages in a_Interface_msg().Impact======An attacker could craft a malicious web page which, when accessed usingDillo, would trigger the format string vulnerability and potentiallyexecute arbitrary code with the rights of the user running Dillo.Workaround==========There is no known workaround at this time.Resolution==========All Dillo users should upgrade to the latest version:    # emerge --sync    # emerge --ask --oneshot --verbose ">=www-client/dillo-0.8.3-r4"References==========  [ 1 ] CAN-2005-0012http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0012Availability============This GLSA and any updates to it are available for viewing atthe Gentoo Security Website:http://security.gentoo.org/glsa/glsa-200501-11.xmlConcerns?=========Security is a primary focus of Gentoo Linux and ensuring theconfidentiality and security of our users machines is of utmostimportance to us. Any security concerns should be addressed tosecurity () gentoo org or alternatively, you may file a bug athttp://bugs.gentoo.org.License=======Copyright 2005 Gentoo Foundation, Inc; referenced textbelongs to its owner(s).The contents of this document are licensed under theCreative Commons - Attribution / Share Alike license.http://creativecommons.org/licenses/by-sa/2.0

Attachment:signature.asc
Description: OpenPGP digital signature


PreviousBy DateNext
PreviousBy ThreadNext

Current thread:


[8]ページ先頭

©2009-2026 Movatter.jp