Debian: DSA-2435-1: gnash security update

    Date19 Mar 2012
    CategoryDebian
    67
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities have been identified in Gnash, the GNU Flash player. CVE-2012-1175
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2435-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                          Gabriele Giacone
    March 19, 2012                         http://www.debian.org/security/faq
    - - -------------------------------------------------------------------------
    
    Package        : gnash
    Vulnerability  : several
    Problem type   : local / local (remote)
    Debian-specific: no
    CVE ID         : CVE-2010-4337 CVE-2011-4328 CVE-2012-1175
    Debian Bug     : 605419 649384 664023
    
    Several vulnerabilities have been identified in Gnash, the GNU Flash
    player.
    
    CVE-2012-1175 
    
      Tielei Wang from Georgia Tech Information Security Center discovered a
      vulnerability in GNU Gnash which is caused due to an integer overflow
      error and can be exploited to cause a heap-based buffer overflow by
      tricking a user into opening a specially crafted SWF file.
    
    CVE-2011-4328
    
      Alexander Kurtz discovered an unsafe management of HTTP cookies. Cookie
      files are stored under /tmp and have predictable names, vulnerability
      that allows a local attacker to overwrite arbitrary files the users has
      write permissions for, and are also world-readable which may cause
      information leak.
    
    CVE-2010-4337
    
      Jakub Wilk discovered an unsafe management of temporary files during the
      build process. Files are stored under /tmp and have predictable names,
      vulnerability that allows a local attacker to overwrite arbitrary files
      the users has write permissions for.
    
    For the stable distribution (squeeze), this problem has been fixed in
    version 0.8.8-5+squeeze1.
    
    For the unstable distribution (sid), this problem has been fixed in
    version 0.8.10-5.
    
    We recommend that you upgrade your gnash packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"7","type":"x","order":"1","pct":58.33,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":25,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"2","type":"x","order":"3","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.