Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 1493-2 (sdl-image1.2)

Information

Severity

Severity

Critical

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

16 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing an update to sdl-image1.2 announced via advisory DSA 1493-2.

Insight

Insight

An oversight led to the version number of the Debian 4.0 `Etch' update for advisory DSA 1493-1 being lower than the version in the main archive, making it uninstallable. This update corrects the version number. For reference the full advisory is quoted below: Several local/remote vulnerabilities have been discovered in the image loading library for the Simple DirectMedia Layer 1.2. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-6697 Gynvael Coldwind discovered a buffer overflow in GIF image parsing, which could result in denial of service and potentially the execution of arbitrary code. CVE-2008-0544 It was discovered that a buffer overflow in IFF ILBM image parsing could result in denial of service and potentially the execution of arbitrary code. For the stable distribution (etch), these problems have been fixed in version 1.2.5-2+etch1. For the old stable distribution (sarge), these problems have been fixed in version 1.2.4-1etch1. Due to a copy & paste error etch1 was appended to the version number instead of sarge1. Since the update is otherwise technically correct, the update was not rebuilt to the buildd network. We recommend that you upgrade your sdl-image1.2 packages.

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201493-2

Common Vulnerabilities and Exposures (CVE)