RHEL 4 / 5 : gd (RHSA-2010:0003)

high Nessus Plugin ID 43628

Language:

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated gd packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

The gd packages provide a graphics library used for the dynamic creation of images, such as PNG and JPEG.

A missing input sanitization flaw, leading to a buffer overflow, was discovered in the gd library. A specially crafted GD image file could cause an application using the gd library to crash or, possibly, execute arbitrary code when opened. (CVE-2009-3546)

Users of gd should upgrade to these updated packages, which contain a backported patch to resolve this issue.

Solution

Update the affected gd, gd-devel and / or gd-progs packages.

See Also

https://access.redhat.com/security/cve/cve-2009-3546

https://access.redhat.com/errata/RHSA-2010:0003

Plugin Details

Severity: High

ID: 43628

File Name: redhat-RHSA-2010-0003.nasl

Version: 1.27

Type: local

Agent: unix

Published: 1/5/2010

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:gd, p-cpe:/a:redhat:enterprise_linux:gd-devel, p-cpe:/a:redhat:enterprise_linux:gd-progs, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:4.8, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:5.4

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 1/4/2010

Vulnerability Publication Date: 10/19/2009

Reference Information

CVE: CVE-2009-3546

BID: 36712

RHSA: 2010:0003