GLSA-201009-01 : wxGTK: User-assisted execution of arbitrary code

This script is Copyright (C) 2010-2015 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-201009-01
(wxGTK: User-assisted execution of arbitrary code)

wxGTK is prone to an integer overflow error in the wxImage::Create()
function in src/common/image.cpp, possibly leading to a heap-based
buffer overflow.

Impact :

A remote attacker might entice a user to open a specially crafted JPEG
file using a program that uses wxGTK, possibly resulting in the remote
execution of arbitrary code with the privileges of the user running the

Workaround :

There is no known workaround at this time.

See also :

Solution :

All wxGTK 2.6 users should upgrade to an updated version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=x11-libs/wxGTK-'
All wxGTK 2.8 users should upgrade to an updated version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=x11-libs/wxGTK-'
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since August 9, 2009. It is likely that your system is
already no longer affected by this issue.

Risk factor :

Medium / CVSS Base Score : 6.8

Family: Gentoo Local Security Checks

Nessus Plugin ID: 49098 (gentoo_GLSA-201009-01.nasl)

Bugtraq ID:

CVE ID: CVE-2009-2369

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now