Izdana je revizija sigurnosne preporuke USN-1367-1 vezane uz programske pakete xulrunner i libpng, prvotno izdane 16. veljače 2012. godine. U izvornoj preporuci opisani su nedostaci koje napadači mogu iskoristiti za proizvoljno izvršavanje programskog koda i DoS (eng. Denial of Service) napad.
dobivanje većih privilegija, proizvoljno izvršavanje programskog koda, uskraćivanje usluga (DoS)
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2011-3026
Izvorni ID preporuke:
USN-1367-4
Izvor:
Ubuntu
Problem:
U radu programske biblioteke libpng uočeno je da dolazi do cjelobrojnog prepisivanja zbog neodgovarajuće obrade blokova podataka. Revizija preporuke je izdana zbog odgovarajućih zakrpi u paketu xulrunner koji koristi navedenu programsku biblioteku.
Posljedica:
Udaljeni napadač može iskoristiti nedostatke za proizvoljno izvršavanje programskog koda s ovlastima korisnika koji je pokrenuo program i za izvođenje DoS napada.
Rješenje:
Savjetuje se korištenje odgovarajućih nadogradnji.
1==========================================================================
Ubuntu Security Notice USN-1367-4
February 17, 2012
xulrunner-1.9.2 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.10
- Ubuntu 10.04 LTS
Summary:
Xulrunner based applications could be made to crash or run programs as your
login if they opened a specially crafted file.
Software Description:
- xulrunner-1.9.2: Mozilla Gecko runtime environment
Details:
USN-1367-1 fixed vulnerabilities in libpng. This provides the corresponding
update for Xulrunner.
Original advisory details:
Jueri Aedla discovered that libpng did not properly verify the size used
when allocating memory during chunk decompression. If a user or automated
system using libpng were tricked into opening a specially crafted image,
an attacker could exploit this to cause a denial of service or execute
code with the privileges of the user invoking the program. (CVE-2011-3026)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 10.10:
xulrunner-1.9.2 1.9.2.27+build1+nobinonly-0ubuntu0.10.10.1
Ubuntu 10.04 LTS:
xulrunner-1.9.2 1.9.2.27+build1+nobinonly-0ubuntu0.10.04.1
After a standard system update you need to restart any application based on
Xulrunner such as Yelp or Conkeror to make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1367-4
http://www.ubuntu.com/usn/usn-1367-1
CVE-2011-3026, https://launchpad.net/bugs/934073
Package Information:
https://launchpad.net/ubuntu/+source/xulrunner-1.9.2/1.9.2.27+build1+nobinonly-0ubuntu0.10.10.1
https://launchpad.net/ubuntu/+source/xulrunner-1.9.2/1.9.2.27+build1+nobinonly-0ubuntu0.10.04.1
Posljednje sigurnosne preporuke