what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Ubuntu Security Notice 529-1

Ubuntu Security Notice 529-1
Posted Oct 12, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 529-1 - It was discovered that Tk could be made to overrun a buffer when loading certain images. If a user were tricked into opening a specially crafted GIF image, remote attackers could cause a denial of service or execute arbitrary code with user privileges.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2007-5137
SHA-256 | 181a30cb952104ee280e828c6d4147ace794a68504848fad11c36abe683a4660

Ubuntu Security Notice 529-1

Change Mirror Download
=========================================================== 
Ubuntu Security Notice USN-529-1 October 11, 2007
tk8.3, tk8.4 vulnerability
CVE-2007-5137
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
tk8.3 8.3.5-4ubuntu1.1
tk8.4 8.4.12-0ubuntu1.1

Ubuntu 6.10:
tk8.3 8.3.5-6ubuntu1.1
tk8.4 8.4.12-1ubuntu0.1

Ubuntu 7.04:
tk8.3 8.3.5-6ubuntu2.1
tk8.4 8.4.14-0ubuntu2.1

In general, a standard system upgrade is sufficient to affect the
necessary changes.

Details follow:

It was discovered that Tk could be made to overrun a buffer when loading
certain images. If a user were tricked into opening a specially crafted
GIF image, remote attackers could cause a denial of service or execute
arbitrary code with user privileges.


Updated packages for Ubuntu 6.06 LTS:

Source archives:

https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5-4ubuntu1.1.diff.gz
Size/MD5: 27182 18c232cfe73ac5ae715070dfebaf48dd
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5-4ubuntu1.1.dsc
Size/MD5: 625 2bf4b0d96dc731beff2a178bdb2540e6
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5.orig.tar.gz
Size/MD5: 2598030 363a55d31d94e05159e9212074c68004
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.12-0ubuntu1.1.diff.gz
Size/MD5: 20932 a2f008e9541d7be33d7db50523c37b00
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.12-0ubuntu1.1.dsc
Size/MD5: 681 504b049b89ce1246f115e799ea66b237
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.12.orig.tar.gz
Size/MD5: 3245547 316491cb82d898b434842353aed1f0d6

Architecture independent packages:

https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4-doc_8.4.12-0ubuntu1.1_all.deb
Size/MD5: 788236 f7dd9433611523eb5d7fef0632dfe3b8
https://security.ubuntu.com/ubuntu/pool/universe/t/tk8.3/tk8.3-doc_8.3.5-4ubuntu1.1_all.deb
Size/MD5: 656814 dc65f7aad63f5c1b95d750d0b3b1a4ff

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3-dev_8.3.5-4ubuntu1.1_amd64.deb
Size/MD5: 697378 ad59718575154976eac75cabdf586a1b
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5-4ubuntu1.1_amd64.deb
Size/MD5: 2919466 fd69617e3af1eaf6ab4f1924023e7397
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4-dev_8.4.12-0ubuntu1.1_amd64.deb
Size/MD5: 846730 43d571a2718de9eafe47d27277d560fb
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.12-0ubuntu1.1_amd64.deb
Size/MD5: 1012152 835d3e558b69e82bac79cf49b3d00455

i386 architecture (x86 compatible Intel/AMD):

https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3-dev_8.3.5-4ubuntu1.1_i386.deb
Size/MD5: 647936 e0d48ac4951015b6936ce8d2d621a652
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5-4ubuntu1.1_i386.deb
Size/MD5: 2732352 17a138d2f5749d76e97a8d7683c06da7
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4-dev_8.4.12-0ubuntu1.1_i386.deb
Size/MD5: 792968 e724cd0fc9bbeac75658a14f8b27e4d5
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.12-0ubuntu1.1_i386.deb
Size/MD5: 956558 41be9d0901d3a1ac67c7c23fd5e89720

powerpc architecture (Apple Macintosh G3/G4/G5):

https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3-dev_8.3.5-4ubuntu1.1_powerpc.deb
Size/MD5: 659876 b5848bcaac427affab78776a35721fdc
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5-4ubuntu1.1_powerpc.deb
Size/MD5: 2931772 23c381d16d06bd5e31732abcc5aab20c
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4-dev_8.4.12-0ubuntu1.1_powerpc.deb
Size/MD5: 806632 86aceab2be696d6b5d561ef9c82dcdf3
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.12-0ubuntu1.1_powerpc.deb
Size/MD5: 999446 d37165f8011c609240d107351dce4764

sparc architecture (Sun SPARC/UltraSPARC):

https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3-dev_8.3.5-4ubuntu1.1_sparc.deb
Size/MD5: 680008 3c9c3ee96a4fee367ccfd65f3576854d
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5-4ubuntu1.1_sparc.deb
Size/MD5: 2792092 080fdef4dd1b659d98467ae86d624c0c
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4-dev_8.4.12-0ubuntu1.1_sparc.deb
Size/MD5: 826668 8977e2bb1dde135274dbd06b20694703
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.12-0ubuntu1.1_sparc.deb
Size/MD5: 978958 5d7837807bb85880ee33ec869adeae1f

Updated packages for Ubuntu 6.10:

Source archives:

https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5-6ubuntu1.1.diff.gz
Size/MD5: 27419 dc87abe90a6ebec0b47010f660032003
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5-6ubuntu1.1.dsc
Size/MD5: 680 1fc9de2bde00e1dd3cc1306dc6d6da04
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5.orig.tar.gz
Size/MD5: 2598030 363a55d31d94e05159e9212074c68004
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.12-1ubuntu0.1.diff.gz
Size/MD5: 21250 f96722290a7b084194de6161d79b0062
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.12-1ubuntu0.1.dsc
Size/MD5: 681 fb2d2c2c4466afc6177638527d8e8872
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.12.orig.tar.gz
Size/MD5: 3245547 316491cb82d898b434842353aed1f0d6

Architecture independent packages:

https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3-doc_8.3.5-6ubuntu1.1_all.deb
Size/MD5: 656986 115134300fb7482b6a3f4779a9c4e765
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4-doc_8.4.12-1ubuntu0.1_all.deb
Size/MD5: 788208 e2797c7c1afaea47e0ee06c70d568038

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3-dev_8.3.5-6ubuntu1.1_amd64.deb
Size/MD5: 695078 d8bada6d71621e11e18899977c3edade
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5-6ubuntu1.1_amd64.deb
Size/MD5: 831894 a6f35a385fa86e79db973e954938e0bb
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4-dev_8.4.12-1ubuntu0.1_amd64.deb
Size/MD5: 843436 b9319791bd8b053418150ed07df23997
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.12-1ubuntu0.1_amd64.deb
Size/MD5: 1009248 f66fa778d4a03f9d13a173015ed9224a

i386 architecture (x86 compatible Intel/AMD):

https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3-dev_8.3.5-6ubuntu1.1_i386.deb
Size/MD5: 671922 8b8d565f9757d34c2af451db2fa9bd63
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5-6ubuntu1.1_i386.deb
Size/MD5: 804212 3f48315bc7ea7706803e940b37b25f23
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4-dev_8.4.12-1ubuntu0.1_i386.deb
Size/MD5: 819580 d0c0643117eca62c153880c85bf92b03
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.12-1ubuntu0.1_i386.deb
Size/MD5: 977614 f96da8c646399b6ad7e71029bb65d3b1

powerpc architecture (Apple Macintosh G3/G4/G5):

https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3-dev_8.3.5-6ubuntu1.1_powerpc.deb
Size/MD5: 663954 5c3f936a08ba71ec95c52d50b611fb5d
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5-6ubuntu1.1_powerpc.deb
Size/MD5: 827066 cfb03dab444cb9d69e5c8344a0c8a160
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4-dev_8.4.12-1ubuntu0.1_powerpc.deb
Size/MD5: 812316 245adbc51f62891540116c432c3ebcd4
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.12-1ubuntu0.1_powerpc.deb
Size/MD5: 1001796 30e31e66f5d46e40dd16db0b618d5228

sparc architecture (Sun SPARC/UltraSPARC):

https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3-dev_8.3.5-6ubuntu1.1_sparc.deb
Size/MD5: 686014 cb564e3dcaf07812d49c89d421b7f518
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5-6ubuntu1.1_sparc.deb
Size/MD5: 809634 db243a2c6a304147739826ddd6ee07a0
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4-dev_8.4.12-1ubuntu0.1_sparc.deb
Size/MD5: 830600 f81e2e0935c3a745bffbe1e259e4383b
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.12-1ubuntu0.1_sparc.deb
Size/MD5: 982466 fa93b720c74dd7fdb5b760dd8eee2259

Updated packages for Ubuntu 7.04:

Source archives:

https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5-6ubuntu2.1.diff.gz
Size/MD5: 27536 2e1f8e3542db1221dadb528cb763515a
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5-6ubuntu2.1.dsc
Size/MD5: 764 ccf27eb659386f992065562a7f4ccdcd
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5.orig.tar.gz
Size/MD5: 2598030 363a55d31d94e05159e9212074c68004
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.14-0ubuntu2.1.diff.gz
Size/MD5: 20404 979db86bd23cd5d1ba11ae13393cbbf6
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.14-0ubuntu2.1.dsc
Size/MD5: 766 a007758d76c0de1ce27cfb9d190f0562
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.14.orig.tar.gz
Size/MD5: 3268223 d12f591f5689f95c82bfb9c1015407bb

Architecture independent packages:

https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3-doc_8.3.5-6ubuntu2.1_all.deb
Size/MD5: 657038 41dcdb86d81385d0217b2ed01a9dadc5
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4-doc_8.4.14-0ubuntu2.1_all.deb
Size/MD5: 798298 a19b4b74e3ff8b307ba1312b01eb0846

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3-dev_8.3.5-6ubuntu2.1_amd64.deb
Size/MD5: 695462 ef341b05ceb4442d2fa787c4601442ad
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5-6ubuntu2.1_amd64.deb
Size/MD5: 837440 e3f7627d608272b2968fed3097e56189
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4-dev_8.4.14-0ubuntu2.1_amd64.deb
Size/MD5: 854790 cf06de203ba9f7e23533c3e988e6a092
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.14-0ubuntu2.1_amd64.deb
Size/MD5: 1027922 e3965e81c3e0554c72ea50099ef1ae95

i386 architecture (x86 compatible Intel/AMD):

https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3-dev_8.3.5-6ubuntu2.1_i386.deb
Size/MD5: 671976 70a9f33b2419628923eeade00a91d6d7
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5-6ubuntu2.1_i386.deb
Size/MD5: 809356 257d6422e86aea93933f498dcea48235
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4-dev_8.4.14-0ubuntu2.1_i386.deb
Size/MD5: 830752 4e7e99a5071c0d3722282d93034105b9
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.14-0ubuntu2.1_i386.deb
Size/MD5: 996014 46222052be37d2cb282a5e0a02209817

powerpc architecture (Apple Macintosh G3/G4/G5):

https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3-dev_8.3.5-6ubuntu2.1_powerpc.deb
Size/MD5: 670688 21f2a7b3665b6361b2444f7f98bc158d
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5-6ubuntu2.1_powerpc.deb
Size/MD5: 831940 819e6426c03f52442b7f8c05f8bdc61f
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4-dev_8.4.14-0ubuntu2.1_powerpc.deb
Size/MD5: 832062 a6343805717f88b2fbfb9bffefdd355a
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.14-0ubuntu2.1_powerpc.deb
Size/MD5: 1034612 4f9be15a98a8db40f250f915a2f5658c

sparc architecture (Sun SPARC/UltraSPARC):

https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3-dev_8.3.5-6ubuntu2.1_sparc.deb
Size/MD5: 685690 55ae6b1c858fc6b126f17dc9655f3b11
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.3/tk8.3_8.3.5-6ubuntu2.1_sparc.deb
Size/MD5: 813948 4f292972586dd313133a3e86a4cd60b3
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4-dev_8.4.14-0ubuntu2.1_sparc.deb
Size/MD5: 841456 16158430f66eefabdfa7c5254add6b2a
https://security.ubuntu.com/ubuntu/pool/main/t/tk8.4/tk8.4_8.4.14-0ubuntu2.1_sparc.deb
Size/MD5: 1000590 f4123ed9ce40b12953aac59fda5013d9

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close