Red Hat patches critical hole
Range of other Linux security issues also pop up
TechWorld.com - Red Hat Inc. is warning enterprise Linux users to update their installations of XFree86 to fix a number of serious security bugs, some of which could allow attackers to take over a system.
The affected operating systems include Enterprise Linux AS 3, Enterprise Linux ES 3 and Enterprise Linux WS 3, Red Hat said in an advisory.
Separately, vendors have patched critical flaws in ImageMagick, Sylpheed and several components of Silicon Graphics Inc.'s Advanced Linux Environment.
XFree86 is an implementation of the X Window System providing low-level graphics functionality for graphical user interface systems such as KDE and GNOME. The most serious flaw is an integer overflow in the libXpm library, which is used by some applications in opening XPM images, Red Hat said. An attacker could use a malicious XPM file to execute code on a user's system.
Red Hat said the bug is moderately critical, but independent security firm Secunia said in an advisory that the vulnerability is serious because it could allow a remote attacker to gain system access. The latest XFree86 release, issued on March 16, fixes the libXpm vulnerability and several others.
Red Hat and others are also patching a newly disclosed vulnerability in the Sylpheed e-mail client, which could allow the execution of malicious code when a message is displayed. Attackers could use a message containing an attachment with a MIME-encoded file name to trigger a boundary error, resulting in a buffer overflow, according to researchers. Versions 0.8.0 to 1.0.3 and development Versions 1.9.0 to 1.9.4 are affected, said Secunia, which gave the bug a "highly critical" rating. The fix is available from Sylpheed's Web site and from Linux vendors.
MandrakeSoft SA and Red Hat have patched flaws in ImageMagick, a widely used open-source image editing suite, that could allow the remote execution of malicious code. The bugs include a format string error within the handling of file names and a boundary error in the decoding of PSD images, and they could be exploited by specially crafted image files, according to security experts.
SGI issued an update for its Advanced Linux Environment to fix a number of bugs that could allow remote system takeover or denial-of-service attack or let malicious local users manipulate the contents of some files. The bugs affect the xpdf, squid and kdenetwork components, SGI said.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Mobile Applications Case Study: 8 Billion Transactions a Day The story documents how the online brokerage company tradeMONSTER created a custom mobile app and the success gleaned from this initiative. Also covered...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources... All Malware and Vulnerabilities White Papers | Webcasts