First published: Thu Feb 21 2008(Updated: )
Tk is a graphical toolkit for the Tcl scripting language.<br>An input validation flaw was discovered in Tk's GIF image handling. A<br>code-size value read from a GIF image was not properly validated before<br>being used, leading to a buffer overflow. A specially crafted GIF file<br>could use this to cause a crash or, potentially, execute code with the<br>privileges of the application using the Tk graphical toolkit.<br>(CVE-2008-0553)<br>A buffer overflow flaw was discovered in Tk's animated GIF image handling.<br>An animated GIF containing an initial image smaller than subsequent images<br>could cause a crash or, potentially, execute code with the privileges of<br>the application using the Tk library. (CVE-2007-5137)<br>All users are advised to upgrade to these updated packages which contain a<br>backported patches to resolve these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tk | <8.4.13-5.el5_1.1 | 8.4.13-5.el5_1.1 |
redhat/tk | <8.4.13-5.el5_1.1 | 8.4.13-5.el5_1.1 |
redhat/tk-devel | <8.4.13-5.el5_1.1 | 8.4.13-5.el5_1.1 |
redhat/tk-devel | <8.4.13-5.el5_1.1 | 8.4.13-5.el5_1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2008:0136 is classified as moderate due to an input validation flaw leading to a potential buffer overflow.
To fix RHSA-2008:0136, you should upgrade to the latest package versions, specifically tk and tk-devel versions 8.4.13-5.el5_1.1.
RHSA-2008:0136 affects Tk versions prior to 8.4.13-5.el5_1.1.
RHSA-2008:0136 describes an input validation flaw in Tk's GIF image handling that leads to a buffer overflow.
The vendor for RHSA-2008:0136 is Red Hat.