Note: This is an archival copy of Security Sun Alert 201803 as previously published on http://sunsolve.sun.com.
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1001341.1.
Article ID : 1001341.1
Article Type : Sun Alerts (SURE)
Last reviewed : 2006-03-19
Audience : PUBLIC
Copyright Notice: Copyright © 2010, Oracle Corporation and/or its affiliates.

Security Vulnerabilities in The "libgdk_pixbuf" Library May Allow a Remote Unprivileged User the ability to Execute Arbitrary Code



Category
Security

Release Phase
Resolved

Product
GNOME 2.0 Desktop
Sun Java Desktop System 2003

Bug Id
5103573

Date of Workaround Release
23-JUN-2005

Date of Resolved Release
13-JUL-2005

Impact

Due to multiple security vulnerabilities in the libgdk_pixbuf library, a remote unprivileged user may be able to execute arbitrary code with the privileges of a local user when that local user has loaded an XPixmap (Xpm) format image file supplied by an untrusted user.

The libgdk_pixbuf library is part of the GIMP Toolkit (GTK+) and is used for loading and rendering images.

These issues are described in the following documents:


Contributing Factors

These issues can occur in the following releases:

SPARC Platform:

  • GNOME 2.0 (for Solaris 8) without patch 114644-03
  • GNOME 2.0 (for Solaris 9) without patch 114686-03
  • GNOME 2.0.2 (for Solaris 9) without patch 115738-04

x86 Platform

  • GNOME 2.0 (for Solaris 8) without patch 114645-03
  • GNOME 2.0 (for Solaris 9) without patch 114687-03
  • GNOME 2.0.2 (for Solaris 9) without patch 115739-04
  • Solaris 9 with JDS release 2 installed without patch 121092-01

Linux

  • Sun Java Desktop System (JDS) 2003 without the updated RPMs (patch-118903-01)
  • Sun Java Desktop System (JDS) Release 2 without the updated RPMs (patch-118905-01)

Note: Solaris 10 is not affected by these issues.

To determine the version of GNOME that is currently installed on the system, the following command can be run (output will vary by platform):

    % grep description /usr/share/gnome/gnome-about/gnome-version.xml
    <description>fcs-10b</description> for GNOME 2.0 releases
    <description>2.0.0_patch-us2</description>

Alternatively (for the same results), in a terminal window from within the GNOME desktop, the following command can be run:

    % /usr/bin/gnome-about

To determine the release of JDS for Linux installed on a system, the following command can be run:

    % cat /etc/sun-release
    Sun Java Desktop System - 2003

To determine if JDS release 2 is installed on a Solaris 9 system, the following command can be run:

    % grep distributor-version /usr/share/gnome-about/gnome-version.xml
    <distributor-version>Sun Java Desktop System, Release 2</distributor-version>

To determine the version of GTK on JDS for Linux systems, run the following command:

    % rpm -qf /usr/lib/gtk-2.0/2.2.0/loaders/libpixbufloader-xpm.so
    gtk2-2.2.2-30

 


Symptoms

There are no reliable symptoms that would indicate the described issues have been exploited.


Workaround

To work around the described issues, do not load XPixmap (Xpm) images from untrusted sources.


Resolution

These issues are addressed in the following releases:

SPARC Platform

  • GNOME 2.0 (for Solaris 8) with patch 114644-03 or later
  • GNOME 2.0 (for Solaris 9) with patch 114686-03 or later
  • GNOME 2.0.2 (for Solaris 9)with patch 115738-04 or later

x86 Platform

  • GNOME 2.0 (for Solaris 8) with patch 114645-03 or later
  • GNOME 2.0 (for Solaris 9) with patch 114687-03 or later
  • GNOME 2.0.2 (for Solaris 9) with patch 115739-04 or later
  • Solaris 9 with patch 121092-01 or later

Linux

  • Sun Java Desktop System (JDS) 2003 with the updated RPMs (patch-118903-01)
  • Sun Java Desktop System (JDS) Release 2 with the updated RPMs (patch-118905-01)

To download and install the updated RPMs from the update servers, select the following sequence from the "launch" bar:

    Launch >> Applications >> System Tools >> Online Update

For more information on obtaining RPM updates, see:



Modification History
Date: 13-JUL-2005
  • State: Resolved
  • Updated Contributing Factors and Relief/Workaround sections

Date: 20-MAR-2006
  • Updated Contributing Factors and Resolution sections


References

114644-03
114686-03
114645-03
114687-03
115738-04
115739-04




Attachments
This solution has no attachment