Language Selection

English French German Italian Portuguese Spanish

Netscape laid wide open by security flaw

Filed under
Security

Two separate imaging-related security flaws have surfaced in AOL's Netscape browser and in the KDE desktop environment for Unix and Linux, according to security experts. Both could allow an attacker to plant malicious code on a user's system when a specially crafted image is viewed by an affected application, such as a browser, e-mail program or stand-alone viewer, researchers said.

Vulnerabilities in image-viewing components are among the easiest to exploit, particularly when they affect Internet-connected applications such as browsers and email programs, say experts. "If the libraries are used by other types of client applications, where the user has to download a malicious file and open it in a specific application, it complicates the attack a bit," said Thomas Kristensen, CTO of security firm Secunia.

The flaw in Netscape, affecting versions 6.x and 7.x, involves a boundary error in the way Netscape extension 2 blocks handle gif images, according to Internet Security Systems, which disclosed the flaw last month; the bug was patched in Mozilla-based products in March.

But the gif flaw also affects Netscape, and is unpatched, Secunia said in an advisory published on Tuesday. The vulnerability has been confirmed in version 7.2 and also reported in version 6.2.3 but is likely to affect other versions as well, Secunia said.

A separate vulnerability affects KDE's kdelibs, specifically an error in the kimgio component when processing PCX image files. Kimgio is used in KHTML-based Web browsers as well as KDE imaging applications such as kpresenter and ksnapshot, meaning that if an image crafted to exploit the flaw were viewed in any of these applications, they could allow an attacker to execute malicious code. The flaw affects KDE versions 3.2 to 3.4, Secunia said.

A patch is available from KDE and from various Linux distributors, including Suse, Gentoo and Debian.

Full Story.

More in Tux Machines

And now for some good news... How open source triumphed over Microsoft Office in Italy

Microsoft Office may have a global monopoly, but one Italian region rejected it flat out. But, why? In the stunningly beautiful Italian region of Umbria, you'll feel more at home running open source software, rather than the clunky and expensive Microsoft Office suite. Read more

Red Hat, Chilean government hold talks on open source initiative

The head of Chilean regulator Pedro Huichalaf agreed to pass information regarding the benefits of open source software to the ministerial committee for digital development Read more

IT teams are choosing open source - but not just for the cost savings

IT decision makers are increasingly turning to open source over proprietary software because they believe it offers them better business continuity and control Read more

Patent Troll Kills Open Source Project On Speeding Up The Computation Of Erasure Codes

Via James Bessen, we learn of how a patent trolling operation by StreamScale has resulted in an open source project completely shutting down, despite the fact that the patent in question (US Patent 8,683,296 for an "Accelerated erasure coding system and method") is almost certainly ineligible for patent protection as an abstract idea, following the Supreme Court's Alice ruling and plenty of prior art. Erasure codes are used regularly today in cloud computing data storage and are considered to be rather important. Not surprisingly, companies and lawyers are starting to pop out of the woodwork to claim patents on key pieces. I won't pretend to understand the fundamental details of erasure codes, but the link above provides all the details. It goes through the specific claims in the patents, breaking down what they actually say (basically an erasure code on a computer using SIMD instructions), and how that's clearly an abstract idea and thus not patent-eligible. Read more