Lucene search

K
gentooGentoo FoundationGLSA-200904-02
HistoryApr 03, 2009 - 12:00 a.m.

GLib: Execution of arbitrary code

2009-04-0300:00:00
Gentoo Foundation
security.gentoo.org
19

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.001

Percentile

35.7%

Background

The GLib is a library of C routines that is used by a multitude of programs.

Description

Diego E. Petteno` reported multiple integer overflows in glib/gbase64.c when converting a long string from or to a base64 representation.

Impact

A remote attacker could entice a user or automated system to perform a base64 conversion via an application using GLib, possibly resulting in the execution of arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All GLib 2.18 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.18.4-r1"

All GLib 2.16 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.16.6-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-libs/glib<Β 2.18.4-r1UNKNOWN

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.001

Percentile

35.7%