First published: Thu Feb 21 2008(Updated: )
Tk is a graphical toolkit for the Tcl scripting language.<br>An input validation flaw was discovered in Tk's GIF image handling. A<br>code-size value read from a GIF image was not properly validated before<br>being used, leading to a buffer overflow. A specially crafted GIF file<br>could use this to cause a crash or, potentially, execute code with the<br>privileges of the application using the Tk graphical toolkit.<br>(CVE-2008-0553)<br>A buffer overflow flaw was discovered in Tk's animated GIF image handling.<br>An animated GIF containing an initial image smaller than subsequent images<br>could cause a crash or, potentially, execute code with the privileges of<br>the application using the Tk library. (CVE-2007-5378)<br>All users are advised to upgrade to these updated packages which contain a<br>backported patches to resolve these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tk | <8.4.7-3.el4_6.1 | 8.4.7-3.el4_6.1 |
redhat/tk | <8.4.7-3.el4_6.1 | 8.4.7-3.el4_6.1 |
redhat/tk-devel | <8.4.7-3.el4_6.1 | 8.4.7-3.el4_6.1 |
redhat/tk-devel | <8.4.7-3.el4_6.1 | 8.4.7-3.el4_6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2008:0135 is classified as moderate due to the potential for a buffer overflow vulnerability in Tk's GIF image handling.
To fix RHSA-2008:0135, upgrade the tk and tk-devel packages to version 8.4.7-3.el4_6.1 or later.
The vulnerability in RHSA-2008:0135 is caused by an input validation flaw in the handling of code-size values from GIF images, leading to possible buffer overflow.
The affected software for RHSA-2008:0135 includes the tk and tk-devel packages in versions prior to 8.4.7-3.el4_6.1.
There are no specific workarounds for RHSA-2008:0135; the best solution is to apply the recommended updates.