CVE编号
CVE-2013-7447利用情况
暂无补丁情况
官方补丁披露时间
2016-02-18漏洞描述
GTK+是用于创建图形用户界面的多平台工具包。GTK+ 3.9.8之前的版本存在整数溢出漏洞,允许远程攻击者通过一个大的图像文件触发大内存分配导致拒绝服务。
解决建议
用户可参考如下厂商提供的安全公告获取补丁以修复该漏洞:https://github.com/mate-desktop/eom/issues/93
参考链接 |
|
---|---|
http://lists.opensuse.org/opensuse-updates/2016-03/msg00010.html | |
http://www.openwall.com/lists/oss-security/2016/02/10/2 | |
http://www.openwall.com/lists/oss-security/2016/02/10/6 | |
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html | |
http://www.securityfocus.com/bid/83239 | |
http://www.ubuntu.com/usn/USN-2898-1 | |
http://www.ubuntu.com/usn/USN-2898-2 | |
https://bugs.launchpad.net/ubuntu/+source/gtk+2.0/+bug/1540811 | |
https://bugzilla.gnome.org/show_bug.cgi?id=703220 | |
https://git.gnome.org/browse/gtk+/commit?id=894b1ae76a32720f4bb3d39cf460402e3ce331d6 | |
https://git.gnome.org/browse/gtk+/tree/NEWS | |
https://github.com/mate-desktop/eom/issues/93 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | gtk | gtk+ | * |
Up to (including) 3.9.6 |
|||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 12.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 14.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 15.10 | - | |||||
运行在以下环境 | |||||||||
系统 | debian_6 | gtk+2.0 | * |
Up to (excluding) 2.20.1-2+deb6u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_7 | gtk+2.0 | * |
Up to (excluding) 3.4.2-7+deb7u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | gtk+2.0 | * |
Up to (excluding) 2.24.25-3+deb8u1 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_23 | gtk+2.0 | * |
Up to (excluding) 3.18.3-1.fc23 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_13.2 | gtk+2.0 | * |
Up to (excluding) 2.20.2-18.14.3 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.1 | gtk+2.0 | * |
Up to (excluding) 3.16.4-6.1 |
|||||
运行在以下环境 | |||||||||
系统 | sles_11_SP4 | gtk+2.0 | * |
Up to (excluding) 2.18.9-0.44.1 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12 | typelib-1_0-Gtk-2_0 | * |
Up to (excluding) 2.24.31-7 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12_SP1 | gtk+2.0 | * |
Up to (excluding) 2.24.24-3.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_11_SP4 | eog | * |
Up to (excluding) 2.18.9-0.44.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP1 | eog | * |
Up to (excluding) 0-2.24.24-3.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_12.04_lts | eog | * |
Up to (excluding) 3.4.2-0ubuntu1.2 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04_lts | eog | * |
Up to (excluding) 3.10.2-0ubuntu5.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | eog | * |
Up to (excluding) 3.18.1-1ubuntu2 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04_lts | eog | * |
Up to (excluding) 3.18.1-1ubuntu2 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | eog | * |
Up to (excluding) 3.18.1-1ubuntu2 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04_lts | eog | * |
Up to (excluding) 3.18.1-1ubuntu2 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.10 | eog | * |
Up to (excluding) 3.18.1-1ubuntu2 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_20.04 | eog | * |
Up to (excluding) 3.18.1-1ubuntu2 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_21.04 | eog | * |
Up to (excluding) 3.18.1-1ubuntu2 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...