exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2012-002

Mandriva Linux Security Advisory 2012-002
Posted Jan 2, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-002 - t1lib 5.1.2 and earlier uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a specially crafted Type 1 font in a PDF document. The updated packages have been patched to correct this issue.

tags | advisory, remote, arbitrary
systems | linux, mandriva
advisories | CVE-2011-0764
SHA-256 | 60428b231e6e685f90934eef256d10a1f276a4dc719c3d75122cf6e911385901

Mandriva Linux Security Advisory 2012-002

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2012:002
http://www.mandriva.com/security/
_______________________________________________________________________

Package : t1lib
Date : January 2, 2012
Affected: 2010.1, 2011., Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in t1lib:

t1lib 5.1.2 and earlier uses an invalid pointer in conjunction with
a dereference operation, which allows remote attackers to execute
arbitrary code via a specially crafted Type 1 font in a PDF document
(CVE-2011-0764).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2010.1:
736337c41d7a950e14295f328745fd27 2010.1/i586/libt1lib5-5.1.2-8.2mdv2010.2.i586.rpm
813152c5481cf07cd8d99c2f0869a59a 2010.1/i586/libt1lib-devel-5.1.2-8.2mdv2010.2.i586.rpm
c06988fef2ca8807fa5f4cf93f7c6028 2010.1/i586/libt1lib-static-devel-5.1.2-8.2mdv2010.2.i586.rpm
6cf4ba79e30bd53541a4f07a39084911 2010.1/i586/t1lib-config-5.1.2-8.2mdv2010.2.i586.rpm
60d961c0411c0c98b547c623c03541b1 2010.1/i586/t1lib-progs-5.1.2-8.2mdv2010.2.i586.rpm
f03a530d559e867382eb6019c9d72271 2010.1/SRPMS/t1lib-5.1.2-8.2mdv2010.2.src.rpm

Mandriva Linux 2010.1/X86_64:
ebdf62d8fcc239056b321add6f465d14 2010.1/x86_64/lib64t1lib5-5.1.2-8.2mdv2010.2.x86_64.rpm
211d1f28995b631a524f484ffc0bf6f1 2010.1/x86_64/lib64t1lib-devel-5.1.2-8.2mdv2010.2.x86_64.rpm
d23e081377659e1052bb938373159aa2 2010.1/x86_64/lib64t1lib-static-devel-5.1.2-8.2mdv2010.2.x86_64.rpm
dce8a152687348ae926c16eb8149409c 2010.1/x86_64/t1lib-config-5.1.2-8.2mdv2010.2.x86_64.rpm
d757fde4ed8a3211143e1e5c22a65cc0 2010.1/x86_64/t1lib-progs-5.1.2-8.2mdv2010.2.x86_64.rpm
f03a530d559e867382eb6019c9d72271 2010.1/SRPMS/t1lib-5.1.2-8.2mdv2010.2.src.rpm

Mandriva Linux 2011:
b1d91af6ae3ad03f3b3328aabef3491a 2011/i586/libt1lib5-5.1.2-11.1-mdv2011.0.i586.rpm
236e2c32254f8a57352ac083e5bbd207 2011/i586/libt1lib-devel-5.1.2-11.1-mdv2011.0.i586.rpm
945a94f1f6e1da103be813fe567503e3 2011/i586/libt1lib-static-devel-5.1.2-11.1-mdv2011.0.i586.rpm
a88e481bd9e7dd898cfbd44e7419708d 2011/i586/t1lib-config-5.1.2-11.1-mdv2011.0.i586.rpm
c9c78d2627b7851b5a9580258316c1a2 2011/i586/t1lib-progs-5.1.2-11.1-mdv2011.0.i586.rpm
7eaa61424b8c70df589144ac4f94f0e8 2011/SRPMS/t1lib-5.1.2-11.1.src.rpm

Mandriva Linux 2011/X86_64:
c614966e22c3e938b1d6b281198d8c65 2011/x86_64/lib64t1lib5-5.1.2-11.1-mdv2011.0.x86_64.rpm
58302f9a21cd083b07bb4d11d2f33025 2011/x86_64/lib64t1lib-devel-5.1.2-11.1-mdv2011.0.x86_64.rpm
f02a3ba5f9b92975d3e8f57ce5e1c9bc 2011/x86_64/lib64t1lib-static-devel-5.1.2-11.1-mdv2011.0.x86_64.rpm
6031e97c0a98a94bf02676fb55a25bc3 2011/x86_64/t1lib-config-5.1.2-11.1-mdv2011.0.x86_64.rpm
a4823d7fa62693b958075f6636b2d80a 2011/x86_64/t1lib-progs-5.1.2-11.1-mdv2011.0.x86_64.rpm
7eaa61424b8c70df589144ac4f94f0e8 2011/SRPMS/t1lib-5.1.2-11.1.src.rpm

Mandriva Enterprise Server 5:
3dc617bc21b08591bc6d0bce378e932e mes5/i586/libt1lib5-5.1.2-4.2mdvmes5.2.i586.rpm
725ec350e47e98781c1878e8319c6816 mes5/i586/libt1lib-devel-5.1.2-4.2mdvmes5.2.i586.rpm
c65f8176917dcc140925ba003314790b mes5/i586/libt1lib-static-devel-5.1.2-4.2mdvmes5.2.i586.rpm
f2d805d204260d1337b76165f85facaf mes5/i586/t1lib-config-5.1.2-4.2mdvmes5.2.i586.rpm
6724eaf4fe88225bd7efc8a2fb4729aa mes5/i586/t1lib-progs-5.1.2-4.2mdvmes5.2.i586.rpm
4ad34410ac6ced36e2ead5bf4d6c901a mes5/SRPMS/t1lib-5.1.2-4.2mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
ddff1845d1c1c7e910f177c6ec5db490 mes5/x86_64/lib64t1lib5-5.1.2-4.2mdvmes5.2.x86_64.rpm
eb7f4ca434bd133e0e5fb4f87f25d775 mes5/x86_64/lib64t1lib-devel-5.1.2-4.2mdvmes5.2.x86_64.rpm
8732ecfba47434c69b44aed240ca3f13 mes5/x86_64/lib64t1lib-static-devel-5.1.2-4.2mdvmes5.2.x86_64.rpm
105a1b571853b1958f788a27d8717566 mes5/x86_64/t1lib-config-5.1.2-4.2mdvmes5.2.x86_64.rpm
6ce1bfcbf6edbca9e4110bf9b3118907 mes5/x86_64/t1lib-progs-5.1.2-4.2mdvmes5.2.x86_64.rpm
4ad34410ac6ced36e2ead5bf4d6c901a mes5/SRPMS/t1lib-5.1.2-4.2mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFPAdMwmqjQ0CJFipgRAmZMAJ47lFJRJE8OtRkY+vlJtwEwIMHVHACg0LlP
ROT/onXPZhr3Y8R2Z1Iqcus=
=Q9Q6
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close