Notified: April 16, 2003 Updated: April 17, 2003
Affected
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1 Mandrake Linux Security Update Advisory Package name: eog
Advisory ID: MDKSA-2003:048
Date: April 16th, 2003 Affected versions: 9.0, 9.1, Corporate Server 2.1 Problem Description: A vulnerability was discovered in the Eye of GNOME (EOG) program,
version 2.2.0 and earlier, that is used for displaying graphics. A
carefully crafted filename passed to eog could lead to the execution
of arbitrary code as the user executing eog. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0165 Updated Packages: Corporate Server 2.1: c2b6f3e1b6dc4676795d82fbb5d03270 corporate/2.1/RPMS/eog-1.0.2-1.1mdk.i586.rpm
3929458c9f13ccd8d102316b5180364f corporate/2.1/SRPMS/eog-1.0.2-1.1mdk.src.rpm Mandrake Linux 9.0: c2b6f3e1b6dc4676795d82fbb5d03270 9.0/RPMS/eog-1.0.2-1.1mdk.i586.rpm
3929458c9f13ccd8d102316b5180364f 9.0/SRPMS/eog-1.0.2-1.1mdk.src.rpm Mandrake Linux 9.1: 4e46d00b4bc623843e626890983dcb7d 9.1/RPMS/eog-2.2.0-1.1mdk.i586.rpm
b2c35125798f3bfef1b43bb9e34e3869 9.1/SRPMS/eog-2.2.0-1.1mdk.src.rpm Mandrake Linux 9.1/PPC: 0e88dac227e691a431192c7005d78fc4 ppc/9.1/RPMS/eog-2.2.0-1.1mdk.ppc.rpm
b2c35125798f3bfef1b43bb9e34e3869 ppc/9.1/SRPMS/eog-2.2.0-1.1mdk.src.rpm Bug IDs fixed (see https://qa.mandrakesoft.com for more information): To upgrade automatically, use MandrakeUpdate. The verification of md5
checksums and GPG signatures is performed automatically for you. If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". A list of
FTP mirrors can be obtained from: http://www.mandrakesecure.net/en/ftp.php Please verify the update prior to upgrading to ensure the integrity of
the downloaded package. You can do this with the command: rpm --checksig
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: April 03, 2003 Updated: April 17, 2003
Affected
Red Hat Linux 8.0 and Red Hat Linux 9 ship with an Eye of Gnome package vulnerable to these issues. Updated eog packages are available along with our advisory at the URL below. Users of the Red Hat Network can update their systems using the 'up2date' tool. http://rhn.redhat.com/errata/RHSA-2003-128.html
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.