Scientific Linux Security Update : lcms on SL5.x i386/x86_64

high Nessus Plugin ID 60550

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

Multiple integer overflow flaws which could lead to heap-based buffer overflows, as well as multiple insufficient input validation flaws, were found in LittleCMS. An attacker could use these flaws to create a specially crafted image file which could cause an application using LittleCMS to crash, or, possibly, execute arbitrary code when opened by a victim. (CVE-2009-0723, CVE-2009-0733)

A memory leak flaw was found in LittleCMS. An application using LittleCMS could use excessive amount of memory, and possibly crash after using all available memory, if used to open specially crafted images. (CVE-2009-0581)

All running applications using the lcms library must be restarted for the update to take effect.

Solution

Update the affected lcms, lcms-devel and / or python-lcms packages.

See Also

http://www.nessus.org/u?2796398b

Plugin Details

Severity: High

ID: 60550

File Name: sl_20090319_lcms_on_SL5_x.nasl

Version: 1.7

Type: local

Agent: unix

Published: 8/1/2012

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 3/19/2009

Reference Information

CVE: CVE-2009-0581, CVE-2009-0723, CVE-2009-0733

CWE: 119, 189, 399