exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2007.189

Mandriva Linux Security Advisory 2007.189
Posted Sep 28, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A buffer overflow vulnerability was discovered in t1lib due to improper bounds checking. An attacker could send specially crafted input to an application linked against t1lib which could lead to a denial of service or the execution of arbitrary code.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2007-4033
SHA-256 | a8026709adc16ea23d550adf126409481245d3028976c88f515711b3d24aea52

Mandriva Linux Security Advisory 2007.189

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2007:189
http://www.mandriva.com/security/
_______________________________________________________________________

Package : t1lib
Date : September 27, 2007
Affected: 2007.0, 2007.1, Corporate 3.0, Corporate 4.0
_______________________________________________________________________

Problem Description:

A buffer overflow vulnerability was discovered in t1lib due to improper
bounds checking. An attacker could send specially crafted input to
an application linked against t1lib which could lead to a denial of
service or the execution of arbitrary code.

Updated packages have been patched to prevent this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4033
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.0:
cbdac5227208ce1ee0e3873a017fd310 2007.0/i586/libt1lib5-5.1.0-3.1mdv2007.0.i586.rpm
1ec267053ed01a82da1e4a69e860bea7 2007.0/i586/libt1lib5-devel-5.1.0-3.1mdv2007.0.i586.rpm
9e3536947b46739a6bebae8f27c791f6 2007.0/i586/libt1lib5-static-devel-5.1.0-3.1mdv2007.0.i586.rpm
44a1629a984d4e8aed17fed497afb645 2007.0/i586/t1lib-config-5.1.0-3.1mdv2007.0.i586.rpm
ffd2ec19d1b7b2248ba99dc476f0334e 2007.0/i586/t1lib-progs-5.1.0-3.1mdv2007.0.i586.rpm
6d3ba087bc088de95887bbb081026030 2007.0/SRPMS/t1lib-5.1.0-3.1mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
7302ddcd84216528f563a0afff9f13e9 2007.0/x86_64/lib64t1lib5-5.1.0-3.1mdv2007.0.x86_64.rpm
1c9e9e376fa0c9a3999781f98b3e54c1 2007.0/x86_64/lib64t1lib5-devel-5.1.0-3.1mdv2007.0.x86_64.rpm
3478e0036344cc60dd957ecd9b42d3e8 2007.0/x86_64/lib64t1lib5-static-devel-5.1.0-3.1mdv2007.0.x86_64.rpm
2370d65683dbe200cea28e2809643f52 2007.0/x86_64/t1lib-config-5.1.0-3.1mdv2007.0.x86_64.rpm
8b0f959cac3661d0a8c4d950b12f0798 2007.0/x86_64/t1lib-progs-5.1.0-3.1mdv2007.0.x86_64.rpm
6d3ba087bc088de95887bbb081026030 2007.0/SRPMS/t1lib-5.1.0-3.1mdv2007.0.src.rpm

Mandriva Linux 2007.1:
2f362838de05e2f0b47208ea0363037e 2007.1/i586/libt1lib5-5.1.1-1.1mdv2007.1.i586.rpm
137cbab139e8eac13add031760e68168 2007.1/i586/libt1lib5-devel-5.1.1-1.1mdv2007.1.i586.rpm
227aaeb5b35693db3de34f8f80c431c3 2007.1/i586/libt1lib5-static-devel-5.1.1-1.1mdv2007.1.i586.rpm
236a2b2b1511736aaa303fe16bfef7f9 2007.1/i586/t1lib-config-5.1.1-1.1mdv2007.1.i586.rpm
f1c949c7de238afaa055c8cc1350d9d7 2007.1/i586/t1lib-progs-5.1.1-1.1mdv2007.1.i586.rpm
3a53755fae6aa7f0cde25e535059c366 2007.1/SRPMS/t1lib-5.1.1-1.1mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
be99aaff094fdc728b556cd89c55264b 2007.1/x86_64/lib64t1lib5-5.1.1-1.1mdv2007.1.x86_64.rpm
9d838eba24848d3c5ba643738cddddd6 2007.1/x86_64/lib64t1lib5-devel-5.1.1-1.1mdv2007.1.x86_64.rpm
028d704f2d58eca3241198c3c4ddced0 2007.1/x86_64/lib64t1lib5-static-devel-5.1.1-1.1mdv2007.1.x86_64.rpm
cbc901c6517523834f6c20ff163ad0b5 2007.1/x86_64/t1lib-config-5.1.1-1.1mdv2007.1.x86_64.rpm
25cdc40f3f64fa499c84e82aeaac2f8c 2007.1/x86_64/t1lib-progs-5.1.1-1.1mdv2007.1.x86_64.rpm
3a53755fae6aa7f0cde25e535059c366 2007.1/SRPMS/t1lib-5.1.1-1.1mdv2007.1.src.rpm

Corporate 3.0:
5e28c2db10fa85c05884c1f3f4b229b8 corporate/3.0/i586/t1lib1-1.3.1-14.1.C30mdk.i586.rpm
7d1a89a7ccf9a95245094668d678a990 corporate/3.0/i586/t1lib1-devel-1.3.1-14.1.C30mdk.i586.rpm
6e7366963e47c402b12c278cb346b170 corporate/3.0/i586/t1lib1-progs-1.3.1-14.1.C30mdk.i586.rpm
ac8c1033158e14036a439459b608f12e corporate/3.0/i586/t1lib1-static-devel-1.3.1-14.1.C30mdk.i586.rpm
287aa7fc6ee135e629fcd97689269601 corporate/3.0/SRPMS/t1lib-1.3.1-14.1.C30mdk.src.rpm

Corporate 3.0/X86_64:
87dee3b68224e07431e1372af7dda010 corporate/3.0/x86_64/t1lib1-1.3.1-14.1.C30mdk.x86_64.rpm
64158e29571d0a03d37205b9b7dcf518 corporate/3.0/x86_64/t1lib1-devel-1.3.1-14.1.C30mdk.x86_64.rpm
4fc5b034866dce22681ca038d07fbbdf corporate/3.0/x86_64/t1lib1-progs-1.3.1-14.1.C30mdk.x86_64.rpm
56175b392c80058920294cf53a5ff2f7 corporate/3.0/x86_64/t1lib1-static-devel-1.3.1-14.1.C30mdk.x86_64.rpm
287aa7fc6ee135e629fcd97689269601 corporate/3.0/SRPMS/t1lib-1.3.1-14.1.C30mdk.src.rpm

Corporate 4.0:
44e5d7138b23c9c727a4b73b0e77c0a4 corporate/4.0/i586/libt1lib5-5.1.0-1.1.20060mlcs4.i586.rpm
dc674710b237a11d1c65a524fdf64c53 corporate/4.0/i586/libt1lib5-devel-5.1.0-1.1.20060mlcs4.i586.rpm
1676db932bdb79fc8b25a7788d26b23a corporate/4.0/i586/libt1lib5-static-devel-5.1.0-1.1.20060mlcs4.i586.rpm
614c6e18e986a02e6a7eae5865cdb47e corporate/4.0/i586/t1lib-config-5.1.0-1.1.20060mlcs4.i586.rpm
32fe2bcf3481d0dabf8ddd57f8053fa4 corporate/4.0/i586/t1lib-progs-5.1.0-1.1.20060mlcs4.i586.rpm
58b16472c8f3a04b8d69e132b2465b55 corporate/4.0/SRPMS/t1lib-5.1.0-1.1.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
3163e3c97bc45d75a7c3a859bf0d9a7b corporate/4.0/x86_64/lib64t1lib5-5.1.0-1.1.20060mlcs4.x86_64.rpm
b939be5ac96ace080ff9d9de9825bc7e corporate/4.0/x86_64/lib64t1lib5-devel-5.1.0-1.1.20060mlcs4.x86_64.rpm
130998cc75abb6b4d0f8c7497e281acf corporate/4.0/x86_64/lib64t1lib5-static-devel-5.1.0-1.1.20060mlcs4.x86_64.rpm
2dfe21a41d25e4816cb988c2f9cfac91 corporate/4.0/x86_64/t1lib-config-5.1.0-1.1.20060mlcs4.x86_64.rpm
cde552aaea2a081a5e5466477a262c20 corporate/4.0/x86_64/t1lib-progs-5.1.0-1.1.20060mlcs4.x86_64.rpm
58b16472c8f3a04b8d69e132b2465b55 corporate/4.0/SRPMS/t1lib-5.1.0-1.1.20060mlcs4.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFG+/N6mqjQ0CJFipgRAvE9AJ4109zHLItQJWJpo3CLGuyY15O94gCdFCR7
QV4/MenNHv/YfKBUBODn49M=
=xvzl
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close