GLSA-201009-01 : wxGTK: User-assisted execution of arbitrary code

This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-201009-01
(wxGTK: User-assisted execution of arbitrary code)

wxGTK is prone to an integer overflow error in the wxImage::Create()
function in src/common/image.cpp, possibly leading to a heap-based
buffer overflow.

Impact :

A remote attacker might entice a user to open a specially crafted JPEG
file using a program that uses wxGTK, possibly resulting in the remote
execution of arbitrary code with the privileges of the user running the
application.

Workaround :

There is no known workaround at this time.

See also :

http://www.gentoo.org/security/en/glsa/glsa-201009-01.xml

Solution :

All wxGTK 2.6 users should upgrade to an updated version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=x11-libs/wxGTK-2.6.4.0-r5'
All wxGTK 2.8 users should upgrade to an updated version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=x11-libs/wxGTK-2.8.10.1-r1'
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since August 9, 2009. It is likely that your system is
already no longer affected by this issue.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: Gentoo Local Security Checks

Nessus Plugin ID: 49098 (gentoo_GLSA-201009-01.nasl)

Bugtraq ID:

CVE ID: CVE-2009-2369