copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2006.0099 -- [RedHat] -- Moderate: gd security update

Date: 02 February 2006
References: ESB-2004.0793  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                         ESB-2006.0099 -- [RedHat]
                       Moderate: gd security update
                              2 February 2006

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           gd
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux AS/ES/WS 4
                   Red Hat Enterprise Linux Desktop 4
Impact:            Execute Arbitrary Code/Commands
Access:            Remote/Unauthenticated
CVE Names:         CVE-2004-0941

Ref:               ESB-2004.0793

Original Bulletin: https://rhn.redhat.com/errata/RHSA-2006-0194.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: gd security update
Advisory ID:       RHSA-2006:0194-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2006-0194.html
Issue date:        2006-02-01
Updated on:        2006-02-01
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2004-0941
- - ---------------------------------------------------------------------

1. Summary:

Updated gd packages that fix several buffer overflow flaws are now available.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

The gd package contains a graphics library used for the dynamic creation of
images such as PNG and JPEG.

Several buffer overflow flaws were found in the way gd allocates memory. 
An attacker could create a carefully crafted image that could execute
arbitrary code if opened by a victim using a program linked against the gd
library.  The Common Vulnerabilities and Exposures project (cve.mitre.org)
assigned the name CVE-2004-0941 to these issues.

Users of gd should upgrade to these updated packages, which contain a
backported patch and is not vulnerable to these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

175413 - CVE-2004-0941 additional overflows in gd


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/gd-2.0.28-4.4E.1.src.rpm
0e1bd5cb5215e65a7120b82132ac6b9e  gd-2.0.28-4.4E.1.src.rpm

i386:
884d6670cd82e39db34c684616dea78c  gd-2.0.28-4.4E.1.i386.rpm
999a383add1284e00cc25185fae78008  gd-devel-2.0.28-4.4E.1.i386.rpm
df53c01e62afb6e14d5b8299b68836b0  gd-progs-2.0.28-4.4E.1.i386.rpm

ia64:
884d6670cd82e39db34c684616dea78c  gd-2.0.28-4.4E.1.i386.rpm
e27753d66dc328e1fca00c9817bac747  gd-2.0.28-4.4E.1.ia64.rpm
cf9a90ececb359b4e178a08e58fbec12  gd-devel-2.0.28-4.4E.1.ia64.rpm
9784499cf742864a0c185ac5653d03ab  gd-progs-2.0.28-4.4E.1.ia64.rpm

ppc:
f2aaf2eeb438dc9cdbd2e17d84ab5503  gd-2.0.28-4.4E.1.ppc.rpm
f9d4a0395e2c95f45eaab554ff81412f  gd-2.0.28-4.4E.1.ppc64.rpm
38d97c9832e49fcce8e518647f979212  gd-devel-2.0.28-4.4E.1.ppc.rpm
239b6c7acd59d9b3e01dc4ea2e1bf6d7  gd-progs-2.0.28-4.4E.1.ppc.rpm

s390:
54c5d0d9c01fea69d85d70d9cd7a5662  gd-2.0.28-4.4E.1.s390.rpm
54c3a6d08d050e7607518b76a72737d1  gd-devel-2.0.28-4.4E.1.s390.rpm
ba8a6612e144109d0961f1fe4d301388  gd-progs-2.0.28-4.4E.1.s390.rpm

s390x:
54c5d0d9c01fea69d85d70d9cd7a5662  gd-2.0.28-4.4E.1.s390.rpm
1468dfa689881d58ac8bfe6e0166b359  gd-2.0.28-4.4E.1.s390x.rpm
474c64458e40bea0166796eb711d5045  gd-devel-2.0.28-4.4E.1.s390x.rpm
ee74f993e7381a5f90aaacaff217c262  gd-progs-2.0.28-4.4E.1.s390x.rpm

x86_64:
884d6670cd82e39db34c684616dea78c  gd-2.0.28-4.4E.1.i386.rpm
9f8f96be348ac13b987a872a80ecae58  gd-2.0.28-4.4E.1.x86_64.rpm
3435f155aec324ef3cecca6f4d588e28  gd-devel-2.0.28-4.4E.1.x86_64.rpm
e961c9c4bbe083244017ee6559fcf743  gd-progs-2.0.28-4.4E.1.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/gd-2.0.28-4.4E.1.src.rpm
0e1bd5cb5215e65a7120b82132ac6b9e  gd-2.0.28-4.4E.1.src.rpm

i386:
884d6670cd82e39db34c684616dea78c  gd-2.0.28-4.4E.1.i386.rpm
999a383add1284e00cc25185fae78008  gd-devel-2.0.28-4.4E.1.i386.rpm
df53c01e62afb6e14d5b8299b68836b0  gd-progs-2.0.28-4.4E.1.i386.rpm

x86_64:
884d6670cd82e39db34c684616dea78c  gd-2.0.28-4.4E.1.i386.rpm
9f8f96be348ac13b987a872a80ecae58  gd-2.0.28-4.4E.1.x86_64.rpm
3435f155aec324ef3cecca6f4d588e28  gd-devel-2.0.28-4.4E.1.x86_64.rpm
e961c9c4bbe083244017ee6559fcf743  gd-progs-2.0.28-4.4E.1.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/gd-2.0.28-4.4E.1.src.rpm
0e1bd5cb5215e65a7120b82132ac6b9e  gd-2.0.28-4.4E.1.src.rpm

i386:
884d6670cd82e39db34c684616dea78c  gd-2.0.28-4.4E.1.i386.rpm
999a383add1284e00cc25185fae78008  gd-devel-2.0.28-4.4E.1.i386.rpm
df53c01e62afb6e14d5b8299b68836b0  gd-progs-2.0.28-4.4E.1.i386.rpm

ia64:
884d6670cd82e39db34c684616dea78c  gd-2.0.28-4.4E.1.i386.rpm
e27753d66dc328e1fca00c9817bac747  gd-2.0.28-4.4E.1.ia64.rpm
cf9a90ececb359b4e178a08e58fbec12  gd-devel-2.0.28-4.4E.1.ia64.rpm
9784499cf742864a0c185ac5653d03ab  gd-progs-2.0.28-4.4E.1.ia64.rpm

x86_64:
884d6670cd82e39db34c684616dea78c  gd-2.0.28-4.4E.1.i386.rpm
9f8f96be348ac13b987a872a80ecae58  gd-2.0.28-4.4E.1.x86_64.rpm
3435f155aec324ef3cecca6f4d588e28  gd-devel-2.0.28-4.4E.1.x86_64.rpm
e961c9c4bbe083244017ee6559fcf743  gd-progs-2.0.28-4.4E.1.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/gd-2.0.28-4.4E.1.src.rpm
0e1bd5cb5215e65a7120b82132ac6b9e  gd-2.0.28-4.4E.1.src.rpm

i386:
884d6670cd82e39db34c684616dea78c  gd-2.0.28-4.4E.1.i386.rpm
999a383add1284e00cc25185fae78008  gd-devel-2.0.28-4.4E.1.i386.rpm
df53c01e62afb6e14d5b8299b68836b0  gd-progs-2.0.28-4.4E.1.i386.rpm

ia64:
884d6670cd82e39db34c684616dea78c  gd-2.0.28-4.4E.1.i386.rpm
e27753d66dc328e1fca00c9817bac747  gd-2.0.28-4.4E.1.ia64.rpm
cf9a90ececb359b4e178a08e58fbec12  gd-devel-2.0.28-4.4E.1.ia64.rpm
9784499cf742864a0c185ac5653d03ab  gd-progs-2.0.28-4.4E.1.ia64.rpm

x86_64:
884d6670cd82e39db34c684616dea78c  gd-2.0.28-4.4E.1.i386.rpm
9f8f96be348ac13b987a872a80ecae58  gd-2.0.28-4.4E.1.x86_64.rpm
3435f155aec324ef3cecca6f4d588e28  gd-devel-2.0.28-4.4E.1.x86_64.rpm
e961c9c4bbe083244017ee6559fcf743  gd-progs-2.0.28-4.4E.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0941

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFD4Pr4XlSAg2UNWIIRAoHgAJ9g/77+8bgowdyTMonutNBH5/0ASwCcD0y4
dqLb6dSNqU6Yx5OkfhXNlwk=
=s6dl
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBQ+G7OSh9+71yA2DNAQLTmAP/ciJ5g8iDGlLPCHmZcnnM8JcthUUD7Mp3
PqYIouBQ4d47mB8jibxW48TLsfB7K5QlVmb9OhJwqyo3mTZL2bHHu1rJzYQJ89VW
J3r05tgYnKAYuTcFmBl2w9F7cOWwrropbLF2wtfw3/rx4C61b7ChZClm8rpN/vB/
Zz8twBUBsPM=
=d0Qr
-----END PGP SIGNATURE-----