RHEL 4 / 5 : gd (RHSA-2010:0003)

This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated gd packages that fix a security issue are now available for
Red Hat Enterprise Linux 4 and 5.

This update has been rated as having moderate security impact by the
Red Hat Security Response Team.

The gd packages provide a graphics library used for the dynamic
creation of images, such as PNG and JPEG.

A missing input sanitization flaw, leading to a buffer overflow, was
discovered in the gd library. A specially crafted GD image file could
cause an application using the gd library to crash or, possibly,
execute arbitrary code when opened. (CVE-2009-3546)

Users of gd should upgrade to these updated packages, which contain a
backported patch to resolve this issue.

See also :

https://www.redhat.com/security/data/cve/CVE-2009-3546.html
http://rhn.redhat.com/errata/RHSA-2010-0003.html

Solution :

Update the affected gd, gd-devel and / or gd-progs packages.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Red Hat Local Security Checks

Nessus Plugin ID: 43628 ()

Bugtraq ID: 36712

CVE ID: CVE-2009-3546