summaryrefslogtreecommitdiff
blob: ba29b298549371f081ba1b0e00099c160f2c5967 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">

<glsa id="200704-10">
  <title>Inkscape: Two format string vulnerabilities</title>
  <synopsis>
    Two format string vulnerabilities have been discovered in Inkscape,
    allowing for user-assisted execution of arbitrary code.
  </synopsis>
  <product type="ebuild">Inkscape</product>
  <announced>April 16, 2007</announced>
  <revised>April 16, 2007: 01</revised>
  <bug>171799</bug>
  <access>remote</access>
  <affected>
    <package name="media-gfx/inkscape" auto="yes" arch="*">
      <unaffected range="ge">0.45.1</unaffected>
      <vulnerable range="lt">0.45.1</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    Inkscape is a vector graphics editor, using Scalable Vector Graphics
    (SVG) Format.
    </p>
  </background>
  <description>
    <p>
    Kees Cook has discovered two vulnerabilities in Inkscape. The
    application does not properly handle format string specifiers in some
    dialog boxes. Inkscape is also vulnerable to another format string
    error in its Jabber whiteboard protocol.
    </p>
  </description>
  <impact type="normal">
    <p>
    A remote attacker could entice a user to open a specially crafted URI,
    possibly leading to execution of arbitrary code with the privileges of
    the user running Inkscape.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All Inkscape users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/inkscape-0.45.1&quot;</code>
  </resolution>
  <references>
    <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1463">CVE-2007-1463</uri>
    <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1464">CVE-2007-1464</uri>
  </references>
  <metadata tag="submitter" timestamp="Mon, 09 Apr 2007 20:15:01 +0000">
    p-y
  </metadata>
  <metadata tag="bugReady" timestamp="Wed, 11 Apr 2007 18:16:25 +0000">
    p-y
  </metadata>
</glsa>