Get a Pentest and security assessment of your IT network.

Advisories

Mandriva Linux Security Advisory 2009-332

Mandriva Linux Security Advisory 2009-332 – Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow. Additionally the patch for in MDVSA-2009:296 was incomplete, this update corrects this as well. This update provides a solution to this vulnerability. Packages for 2009.0 are provided due to the Extended Maintenance Program.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/89025/MDVSA-2009-332-1.txt

Source: https://packetstormsecurity.com/files/89025/Mandriva-Linux-Security-Advisory-2009-332.html

Related posts
Advisories

Secunia Security Advisory 15017

Advisories

Secunia Security Advisory 18394

Advisories

Secunia Security Advisory 21136

Advisories

Secunia Security Advisory 24114