Linux Security
    Linux Security
    Linux Security

    Debian: DSA-2435-1: gnash security update

    Date
    612
    Posted By
    Several vulnerabilities have been identified in Gnash, the GNU Flash player. CVE-2012-1175
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2435-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                          Gabriele Giacone
    March 19, 2012                         https://www.debian.org/security/faq
    - - -------------------------------------------------------------------------
    
    Package        : gnash
    Vulnerability  : several
    Problem type   : local / local (remote)
    Debian-specific: no
    CVE ID         : CVE-2010-4337 CVE-2011-4328 CVE-2012-1175
    Debian Bug     : 605419 649384 664023
    
    Several vulnerabilities have been identified in Gnash, the GNU Flash
    player.
    
    CVE-2012-1175 
    
      Tielei Wang from Georgia Tech Information Security Center discovered a
      vulnerability in GNU Gnash which is caused due to an integer overflow
      error and can be exploited to cause a heap-based buffer overflow by
      tricking a user into opening a specially crafted SWF file.
    
    CVE-2011-4328
    
      Alexander Kurtz discovered an unsafe management of HTTP cookies. Cookie
      files are stored under /tmp and have predictable names, vulnerability
      that allows a local attacker to overwrite arbitrary files the users has
      write permissions for, and are also world-readable which may cause
      information leak.
    
    CVE-2010-4337
    
      Jakub Wilk discovered an unsafe management of temporary files during the
      build process. Files are stored under /tmp and have predictable names,
      vulnerability that allows a local attacker to overwrite arbitrary files
      the users has write permissions for.
    
    For the stable distribution (squeeze), this problem has been fixed in
    version 0.8.8-5+squeeze1.
    
    For the unstable distribution (sid), this problem has been fixed in
    version 0.8.10-5.
    
    We recommend that you upgrade your gnash packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    Which statement best describes how you feel about the recent Linux 5.9 release?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/40-what-change-are-you-most-excited-about-in-linux-5-9?task=poll.vote&format=json
    40
    radio
    [{"id":"140","title":"Not a game-changer for me.","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"141","title":"I'm happy with the performance improvements it offers.","votes":"3","type":"x","order":"2","pct":100,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.