GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Wed Dec 28, 2005 4:18 pm Post subject: [ GLSA 200512-16 ] OpenMotif, AMD64 x86 emulation X librarie |
|
|
Gentoo Linux Security Advisory
Title: OpenMotif, AMD64 x86 emulation X libraries: Buffer overflows in libUil library (GLSA 200512-16)
Severity: low
Exploitable: remote
Date: December 28, 2005
Updated: January 29, 2006
Bug(s): #114234, #116481
ID: 200512-16
Synopsis
Two buffer overflows have been discovered in libUil, part of the OpenMotif toolkit, that can potentially lead to the execution of arbitrary code.
Background
OpenMotif provides a free version of the Motif toolkit for open source applications. The OpenMotif libraries are included in the AMD64 x86 emulation X libraries, which emulate the x86 (32-bit) architecture on the AMD64 (64-bit) architecture.
Affected Packages
Package: x11-libs/openmotif
Vulnerable: < 2.2.3-r8
Unaffected: >= 2.2.3-r8
Unaffected: >= 2.1.30-r13 < 2.1.31
Architectures: All supported architectures
Package: app-emulation/emul-linux-x86-xlibs
Vulnerable: < 2.2.1
Unaffected: >= 2.2.1
Architectures: AMD64
Description
xfocus discovered two potential buffer overflows in the libUil library, in the diag_issue_diagnostic and open_source_file functions.
Impact
Remotely-accessible or SUID applications making use of the affected functions might be exploited to execute arbitrary code with the privileges of the user running the application.
Workaround
There is no known workaround at this time.
Resolution
All OpenMotif users should upgrade to an unaffected version: Code: | # emerge --sync
# emerge --ask --oneshot --unmerge --verbose x11-libs/openmotif
# emerge --ask --oneshot --verbose x11-libs/openmotif | All AMD64 x86 emulation X libraries users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose app-emulation/emul-linux-x86-xlibs |
References
CVE-2005-3964
xfocus SD-051202 Original Advisory
Last edited by GLSA on Sun May 07, 2006 4:59 pm; edited 1 time in total |
|