Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Ubuntu USN-738-1 (glib2.0)

Information

Severity

Severity

Medium

Family

Family

Ubuntu Local Security Checks

CVSSv2 Base

CVSSv2 Base

4.6

CVSSv2 Vector

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

15 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing an update to glib2.0 announced via advisory USN-738-1.

Insight

Insight

Diego Petten discovered that the Base64 encoding functions in GLib did not properly handle large strings. If a user or automated system were tricked into processing a crafted Base64 string, an attacker could possibly execute arbitrary code with the privileges of the user invoking the program.

Solution

Solution

The problem can be corrected by upgrading your system to the following package versions: Ubuntu 7.10: libglib2.0-0 2.14.1-1ubuntu1.1 libglib2.0-udeb 2.14.1-1ubuntu1.1 Ubuntu 8.04 LTS: libglib2.0-0 2.16.6-0ubuntu1.1 libglib2.0-udeb 2.16.6-0ubuntu1.1 Ubuntu 8.10: libglib2.0-0 2.18.2-0ubuntu2.1 libglib2.0-udeb 2.18.2-0ubuntu2.1 After a standard system upgrade you need to reboot your computer to effect the necessary changes. https://secure1.securityspace.com/smysecure/catid.html?in=USN-738-1

Common Vulnerabilities and Exposures (CVE)