FreeBSD : sdl_image -- buffer overflow vulnerabilities (b1bcab7d-1880-11dd-a914-0016179b2dd5)

This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Secunia reports :

Two vulnerabilities have been reported in SDL_image, which can be
exploited by malicious people to cause a Denial of Service or
potentially compromise an application using the library.

A boundary error within the LWZReadByte() function in IMG_gif.c can be
exploited to trigger the overflow of a static buffer via a specially
crafted GIF file.

A boundary error within the 'IMG_LoadLBM_RW()' function in IMG_lbm.c
can be exploited to cause a heap-based buffer overflow via a specially
crafted IFF ILBM file.

See also :

http://www.nessus.org/u?a966b08e

Solution :

Update the affected package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 32148 (freebsd_pkg_b1bcab7d188011dda9140016179b2dd5.nasl)

Bugtraq ID:

CVE ID: CVE-2007-6697
CVE-2008-0544

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now