Linux Compatible
  • News
    • Channels
    • Archive
    • Search
    • Submit
  • Articles
    • Categories
  • Knowledgebase
  • Compatibility
    • Search
  • Links
  • Forums
  • Twitter
Advertisement

Latest News
[ Windows | Linux | Apple ]

· Linux-tools Update for Debian 8
· More Linux Kernel Updates for Ubuntu
· Xiaomi Mi Mix 2s Hands-on Review and more
· Chromium, Google Chrome Security Updates for Gentoo Linux
· Initscripts and Patch Updates for Oracle Linux
· ZSH, Roundcube, and xfig Updates for Arch Linux
· PackageKit, hdf5, and VirtualBox Updates for openSUSE
· MySQL and Linux Kernel Updates for Ubuntu Linux
· Ruby Updates for Debian 7 LTS
· ASUS ROG Strix Scar Edition Laptop Review and more

Upcoming News
· Samsung 860 Pro SSD Review @ Vortez
· Raijintek Orcus 240 @ TechPowerUp
· Team Group Cardea Zero 240 GB @ TechPowerUp
· Guru3D Rig of the Month - January 2018
· Cooler Master MK750 Review @ Vortez
· Seagate Skyhawk 10TB SATA III HDD Review
· Vulkan Continues To Show Its Gaming Strength On Low-End Hardware
· Seagate IronWolf ST12000VN0007 12TB Hard Drive Review @ APH Networks
· Sennheiser Game One @ TechPowerUp
· be quiet! Straight Power 11 1000W Power Supply Review

Linux Compatibility
· Brother DCP-L2540DN
· Sound Blaster E5
· WD Elements 500GB external hard drive
· Canon D660U Flatbad scanner
· Umax Astra 4500 USB Scanner
· Logitech QuickCam Pro 4000
· Dell Latitude E6420
· Creative Sound Blaster Z
· Photosmart 5520
· TB-5300 Slimline Design Tablet

New Forum Topics
· Dale
by: Dale Blinco
on: 2018-02-05 00:26
1 replies, 1211 views

· modem driver needed
by: jongiffen777
on: 2017-12-13 11:11
1 replies, 2392 views

· Need a decent browser for XP Pro!
by: percy
on: 2017-12-05 11:02
2 replies, 4276 views

· Comodo Time Machine + Faronics Deep Freeze
by: Jabberwocky
on: 2017-11-15 23:17
1 replies, 2881 views

· Linux compatablity
by: ibme
on: 2017-10-04 18:05
1 replies, 4793 views

News Channels
· Drivers
· Guides
· Reviews
· Security
· Software
· Press Release
· Updates
· Interviews
· Linux
· General
· Debian
· Red Hat
· Slackware
· Gentoo
· Mandriva
· White Box
· SUSE
· GNOME
· KDE
· CentOS
· Ubuntu
· MEPIS
· Android
· Oracle Linux
· Arch Linux

What's New
Login to see an overview of all news stories since your last visit.

Welcome to our website

To take full advantage of all features you need to login or register. Registration is completely free and takes only a few seconds.

Linux Compatible » News » January 2005 » GLSA 200501-11: Dillo: Format string vulnerability

GLSA 200501-11: Dillo: Format string vulnerability

Posted by Philipp Esselbach on: 01/09/2005 06:58 PM [ Print | 0 comment(s) ]

A Dillo security update is available for Gentoo Linux

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200501-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: Dillo: Format string vulnerability
Date: January 09, 2005
Bugs: #76665
ID: 200501-11

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
=======

Dillo is vulnerable to a format string bug, which may result in the execution of arbitrary code.




Background
=========

Dillo is a small and fast multi-platform web browser based on GTK+.

Affected packages
================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-client/dillo < 0.8.3-r4 >= 0.8.3-r4

Description
==========

Gentoo Linux developer Tavis Ormandy found a format string bug in Dillo's handling of messages in a_Interface_msg().

Impact
=====

An attacker could craft a malicious web page which, when accessed using Dillo, would trigger the format string vulnerability and potentially execute arbitrary code with the rights of the user running Dillo.

Workaround
=========

There is no known workaround at this time.

Resolution
=========

All Dillo users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/dillo-0.8.3-r4"

References
=========

[ 1 ] CAN-2005-0012
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0012

Availability
===========

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200501-11.xml

Concerns?
========

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License
======

Copyright 2005 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0


Bookmark and Share

« Evince 0.1.0 · Muine 0.8.0 »

Linux Compatible » News » January 2005 » GLSA 200501-11: Dillo: Format string vulnerability
All products mentioned are registered trademarks or trademarks of their respective owners.
© 2002-2018 Esselbach Internet Solutions - All Rights Reserved. Terms and privacy policy
Powered by Contentteller® Business Edition