CentOS 4 / 5 : gd (CESA-2010:0003)

high Nessus Plugin ID 43625

Language:

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated gd packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

The gd packages provide a graphics library used for the dynamic creation of images, such as PNG and JPEG.

A missing input sanitization flaw, leading to a buffer overflow, was discovered in the gd library. A specially crafted GD image file could cause an application using the gd library to crash or, possibly, execute arbitrary code when opened. (CVE-2009-3546)

Users of gd should upgrade to these updated packages, which contain a backported patch to resolve this issue.

Solution

Update the affected gd packages.

See Also

http://www.nessus.org/u?477576df

http://www.nessus.org/u?cb6b5deb

http://www.nessus.org/u?920acc8a

http://www.nessus.org/u?136a1ac7

Plugin Details

Severity: High

ID: 43625

File Name: centos_RHSA-2010-0003.nasl

Version: 1.20

Type: local

Agent: unix

Published: 1/5/2010

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:centos:centos:gd-progs, cpe:/o:centos:centos:4, cpe:/o:centos:centos:5, p-cpe:/a:centos:centos:gd, p-cpe:/a:centos:centos:gd-devel

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 1/4/2010

Vulnerability Publication Date: 10/19/2009

Reference Information

CVE: CVE-2009-3546

BID: 36712

RHSA: 2010:0003