Language Selection

English French German Italian Portuguese Spanish

Netscape laid wide open by security flaw

Filed under

Two separate imaging-related security flaws have surfaced in AOL's Netscape browser and in the KDE desktop environment for Unix and Linux, according to security experts. Both could allow an attacker to plant malicious code on a user's system when a specially crafted image is viewed by an affected application, such as a browser, e-mail program or stand-alone viewer, researchers said.

Vulnerabilities in image-viewing components are among the easiest to exploit, particularly when they affect Internet-connected applications such as browsers and email programs, say experts. "If the libraries are used by other types of client applications, where the user has to download a malicious file and open it in a specific application, it complicates the attack a bit," said Thomas Kristensen, CTO of security firm Secunia.

The flaw in Netscape, affecting versions 6.x and 7.x, involves a boundary error in the way Netscape extension 2 blocks handle gif images, according to Internet Security Systems, which disclosed the flaw last month; the bug was patched in Mozilla-based products in March.

But the gif flaw also affects Netscape, and is unpatched, Secunia said in an advisory published on Tuesday. The vulnerability has been confirmed in version 7.2 and also reported in version 6.2.3 but is likely to affect other versions as well, Secunia said.

A separate vulnerability affects KDE's kdelibs, specifically an error in the kimgio component when processing PCX image files. Kimgio is used in KHTML-based Web browsers as well as KDE imaging applications such as kpresenter and ksnapshot, meaning that if an image crafted to exploit the flaw were viewed in any of these applications, they could allow an attacker to execute malicious code. The flaw affects KDE versions 3.2 to 3.4, Secunia said.

A patch is available from KDE and from various Linux distributors, including Suse, Gentoo and Debian.

Full Story.

More in Tux Machines

Phoronix on Graphics

Leftovers: Ubuntu

  • Ubuntu Touch OTA-7 Update Is Being Tested, on Track for October Launch
    The Ubuntu Touch OS is getting a new OTA very soon and the developers are putting the final touches on it. The update is still on track for an October 19 launch and it will remain that way if nothing goes wrong.
  • False Rumors About Microsoft Buying Canonical Are Ridiculous
    The rumor that Microsoft is interested in buying Canonical doesn't seem to go away, despite the fact that there is no real basis to it. We’ve already explained why that is unlikely to happen, but people still don't listen, so here are some more reasons why the rumor is perfect for April 1.
  • Is Microsoft Wooing Canonical & Important Departures…
    A while back I was fitted for a tinfoil hat by some because I had the audacity — the audacity! — to suggest that it would be a shrewd business move by the now-Linux-loving Microsoft to buy Canonical because a.) Canonical had technology that Microsoft would want and need to advance in mobile (like the Ubuntu Phone technology, which blows Microsoft’s out of the water currently), and b.) by this time, Mark Shuttleworth is beyond tired of flushing millions after millions down the toilet (though, as a half-billionaire, he still has several decades of current spending before his bank account resembles, well, mine), and who can blame him? You laughed. Well, sports fans, allow me to hand back your tinfoil hat and ask, who’s laughing now? Linux Journal’s James Darvell outlines this scenario in great detail, quoting a blog item reporting the business deal, and makes an observation worth keeping an eye on: “Microsoft could convert Canonical into a very profitable acquisition by eliminating the unprofitable parts of the company,” he writes. “In fact, it could become the dominant player in the cloud space, and secure the company’s future.”
  • Spice Vulnerabilities Closed in Ubuntu 14.04 LTS and Ubuntu 15.04
    A Spice vulnerability has been found and repaired in the Ubuntu 15.04 and Ubuntu 14.04 LTS operating systems. The SPICE protocol client and server library has been patched in the past few months a couple of times, and this is just the latest fix. It's not a major component, but users should really close any kind of exploit and vulnerability and upgrade their systems frequently.

Security Leftovers

Android Leftovers