Language Selection

English French German Italian Portuguese Spanish

Netscape laid wide open by security flaw

Filed under
Security

Two separate imaging-related security flaws have surfaced in AOL's Netscape browser and in the KDE desktop environment for Unix and Linux, according to security experts. Both could allow an attacker to plant malicious code on a user's system when a specially crafted image is viewed by an affected application, such as a browser, e-mail program or stand-alone viewer, researchers said.

Vulnerabilities in image-viewing components are among the easiest to exploit, particularly when they affect Internet-connected applications such as browsers and email programs, say experts. "If the libraries are used by other types of client applications, where the user has to download a malicious file and open it in a specific application, it complicates the attack a bit," said Thomas Kristensen, CTO of security firm Secunia.

The flaw in Netscape, affecting versions 6.x and 7.x, involves a boundary error in the way Netscape extension 2 blocks handle gif images, according to Internet Security Systems, which disclosed the flaw last month; the bug was patched in Mozilla-based products in March.

But the gif flaw also affects Netscape, and is unpatched, Secunia said in an advisory published on Tuesday. The vulnerability has been confirmed in version 7.2 and also reported in version 6.2.3 but is likely to affect other versions as well, Secunia said.

A separate vulnerability affects KDE's kdelibs, specifically an error in the kimgio component when processing PCX image files. Kimgio is used in KHTML-based Web browsers as well as KDE imaging applications such as kpresenter and ksnapshot, meaning that if an image crafted to exploit the flaw were viewed in any of these applications, they could allow an attacker to execute malicious code. The flaw affects KDE versions 3.2 to 3.4, Secunia said.

A patch is available from KDE and from various Linux distributors, including Suse, Gentoo and Debian.

Full Story.

More in Tux Machines

Another great experience in Fedora bug reporting: Wine font fix solves my web-browsing problem

Fedora‘s motto is “Freedom. Friends. Features. First.” I’m here to tell you Fedora lives up to that billing. Why do I say this now? I’ve just had another positive experience with Fedora, this time in finding a bug in my system, adding my information to an existing bug report and now seeing updated packages pushed to the Fedora 20 stable repositories and onto my system, where the problem has been fixed. Read more

GNU hackers discover HACIENDA government surveillance and give us a way to fight back

GNU community members and collaborators have discovered threatening details about a five-country government surveillance program codenamed HACIENDA. The good news? Those same hackers have already worked out a free software countermeasure to thwart the program. Read more

The top 14 hidden features in Windows, iOS, and Android

You may think you're a high-tech power user who knows all the nooks and crannies of Windows, iOS, and Android, but let's be realistic: There could be at least a few undocumented (or poorly documented) commands, control panels, and apps that have slipped by you—maybe more than a few. We've dived deep into each OS to uncover the best hidden tips and tricks that can make you more productive—or make common tasks easier. Got a favorite undocumented tip to share with readers? Add them in the comments section at the end of the article. Read more

Android-on-ARM mini-PC draws less than 7W

The DSA2LS runs a pre-installed Android 4.2.2 (Jelly Bean) with integrated online or offline update functionality on a dual-core, 1GHz Freescale i.MX6 DualLite system-on-chip. The SoC has a Vivante GC880 GPU that’s not as powerful as the Vivante GC2000 GPU found on the Dual and Quad i.MX6 models, but it still plays back 1080p video and offers 3D graphics acceleration. The power-sipping DualLite enables the fanless computer to run at a modest 6.26W active and 1.42W standby, according to Shuttle’s AnTuTu benchmarks. Read more