GdkPixbuf Suffers Image Decoding Vulnerabilities 291
DNAspark99 writes "It seems Multiple vulnerabilities have been reported in GdkPixbuf, which can be exploited by malicious people to DoS (Denial of Service), and potentially compromise a vulnerable system. Personally, I wasn't concerned about this until I ran 'ldd firefox-bin | grep libgdk_pixbuf'" There's no official patch yet, but the article notes several Linux vendors have issued updates. Worth keeping an eye for those who use libgdk_pixbuf under other Unix-style operating systems as well.
Nothing to see here... (Score:3, Insightful)
Re:Nothing to see here... (Score:3, Funny)
Re:Nothing to see here... (Score:3, Insightful)
Re:I thought Linux was immune to this... (Score:2, Insightful)
Hmm, gue
Re:I thought Linux was immune to this... (Score:2, Insightful)
You seem to be missing the point. ALL software has bugs and those bugs need to be found the removed. That is the software cycle.
I can't wait for the proverbial monkeys to start pounding away on all the upcoming Linux boxes and the inevitable number of bugs to be discovered.
You know, I can't wait either because the
Re:I thought Linux was immune to this... (Score:3, Interesting)
gnome uses this (Score:5, Insightful)
update your systems...
Re:gnome uses this (Score:4, Informative)
bonobo
galeon
gdm
gnome-control-center
gnome-help
gnome-panel
gnome-session
gnome-utils
libgnomeprint-bin
nautilus
rep-gtk-gnome
sawfish-gnome
xchat-gnome
It's a biggie, all right.
Re:gnome uses this (Score:2)
If you are talking about the executable in the abstract, compiled against dynamically linked library, then no, it is only linked AGAINST the lib (Or linked with the lib header). It only gets linked WITH the lib itself at run-time.
So when people are talking about programs as they exist on disk such as in a distribution or as they are being doanloaded, then it's usually talked about as the code has been linked against the lib, in that state it is not linked with the lib. (Course there are programs t
Somebody is busy ... (Score:5, Insightful)
sigh Time to tell the idealist in me to STFU.
-paul
Re:Somebody is busy ... (Score:5, Informative)
as the vsftpd author (http://vsftpd.beasts.org/), and
here (http://scary.beasts.org/security/) are other bugs he found.
Re:Somebody is busy ... (Score:5, Insightful)
What we really need is a web page summarizing all the recent bugs in media decoding (mpg123 I think just had one) as a "how not to program" guide and then make it mandatory reading to get a sourceforge account. I think it's great folks are out looking for these bugs, but it's an embarrasement that there are this many being found so quickly. To me that indicates that there are a crapload of them out there.
It makes me want to go on vacation for six months and do one upgrade when I get back. Instead of doing one a day for the next six months.
Re:Somebody is busy ... (Score:2)
Re: Somebody is busy ... (Score:2)
Yes, yes, people are starting to notice...
Methinks somebody is doing a thorough code review (..)
Naahhh, it must be a global conspiracy! We just didn't find out yet who is The Evil One behind all this...
Re:Somebody is busy ... (Score:4, Insightful)
Re:Somebody is busy ... (Score:4, Insightful)
Why should they?!? If I ask a question, why should I also have to provide an answer? That is a stupid attitude to have. If everyone who asked questions had the answers, there'd be no questions to ask.
Likewise, why look a gift horse in the mouth when he points out a vulnerability like that? Exploiting is a different art from coding to many people. Maybe it just so happens that some people are better at seeing things that others don't catch?
And don't blame the tools, either. I hear too often people saying things like "if only it were in Java instead of C++, this would not be a problem." A poor workman always blames his tools. A poor musician can ALWAYS say "if only I had a better instrument, I could be a better musician." One simple word for that: Balderdash.
Re:Somebody is busy ... (Score:4, Informative)
It is often the case that support for some functionality which is buggy in one implementation will be buggy in other implementations as well, so it is pretty common in general for a lot of similar bugs to turn up at the same time.
Re:Somebody is busy ... (Score:3, Insightful)
I wouldn't be surprised if people are just testing the proof-of-concept demonstration files intended to break other image decoding code and finding that it breaks their code too, maybe in a slightly different way. It's not uncommon for separate programmers to make the same thinkos even if they
Let me add: "Well Duh!" (Score:4, Interesting)
That's basically EVERY file format.
Even text can be dangerous. Ever heard of a terminal or ANSI bomb [kernelthread.com]? (scroll down in link).
The only "safe" viewer is a hex editor. Or less (maybe, you get the idea).
There will always be vulnerabilities (Score:3, Interesting)
Time to switch (Score:4, Funny)
Vote against shoddy software with your clicks.
A challenge for search engines? (Score:5, Interesting)
Not exploitable in Firefox (Score:5, Informative)
Re:Not exploitable in Firefox (Score:2)
Re:Not exploitable in Firefox (Score:5, Informative)
Re:Not exploitable in Firefox (Score:5, Informative)
Mike
Re:Not exploitable in Firefox (Score:3, Interesting)
Tony.
Re:Not exploitable in Firefox (Score:2)
If so, we have our vector!
There is always a way.
Re:Not exploitable in Firefox (Score:5, Informative)
Re:Not exploitable in Firefox (Score:2)
Also, if it doesn't use it to draw images on web pages, what does it use? And (aside from the vulnerability) why are two different image libraries used?
Re:Not exploitable in Firefox (Score:4, Informative)
Re:Not exploitable in Firefox (Score:3, Informative)
Re:Not exploitable in Firefox (Score:5, Informative)
It uses libpr0n, Gecko's cross-platform rendering engine to load those images from disk. gdkpixbuf is not used for displaying remote content, even cached remote content.
--Asa
Yeah, I was worried too... (Score:5, Funny)
Re:Yeah, I was worried too... (Score:2, Informative)
Re:Yeah, I was worried too... (Score:5, Informative)
Re:Yeah, I was worried too... (Score:5, Funny)
Oh yeah? Well
Re:Yeah, I was worried too... (Score:3, Informative)
Son of a BITCH, I was just about to post that! GAH!
(Dear Slashdotters: The command shown above will not harm your computer, but will probably require a reboot to recover from it)
Re:Yeah, I was worried too... (Score:3, Interesting)
I entered it in cmd.exe (ie the MS command line interpreter) and nothing happened, it didn't complain about a wrong filename or command, either. Then I entered bash and pasted it, and not much happened either, it indicated that a new background job was started. When I closed bash, though, the computer stalled, the SysInternals task manager crashed (ouch) and mouse movement went sluggish. After a while, an error message came up remarking tha
Re:Yeah, I was worried too... (Score:2, Interesting)
disclaimer: my box would crash if I'd enter :(){ :|:& };:
Re:Yeah, I was worried too... (Score:2)
Alright, so we're all really funny. Now, would someone please explain to me why X died after I ran that as user in a shell?
Re:Yeah, I was worried too... (Score:2)
Re:Yeah, I was worried too... (Score:4, Informative)
:()
{
}
:
Basically, it defines a function called ":" which, when executed, calls itself recursively twice and puts itself into the background. The last ":" actually executes the function. Thus, one shell forks into two shells, those two shells fork into four shells, those four into eight, etc etc etc.
Re:Yeah, I was worried too... (Score:2)
Re:Yeah, I was worried too... (Score:2)
[before you start rm-rf-ing, type man rm]
Re:Yeah, I was worried too... (Score:2)
I'm pretty sure this is some sort of militant feminist code for 'go bash a man with a pipe'.
Yawn (Score:3, Insightful)
I was just using the Icesoft Java web browser [icesoft.com] and the Fluendo media player [fluendo.com]. These are both big applications written in 100% pure Java. They both don't have buffer overflows because Java doesn't have buffers (in the C sense). How many security holes do we need to see every week?
Re:Yawn (Score:2)
Re:Yawn (Score:3, Interesting)
Re: (Score:2)
Re:Yawn (Score:3, Insightful)
There are safe languages with a lot less startup overhead than Java. Even quite slow languages like
Re:Yawn (Score:2, Interesting)
The experience I have of "trying" to use Java programs of any size (I don't think I've come on a
Security is always a problem.. (Score:2, Insightful)
Re:Security is always a problem.. (Score:2, Funny)
Re:Security is always a problem.. (Score:3, Interesting)
It's not the errors like this that bothers me about Windows.
It's the design flaws that get exploited over and over again that are unique to Windows and they refuse to fix for political reasons. I mean, mail software that automatically executed scripts used to be a joke. We all knew that nobody would ever release a program like that, or if they did they'd rem
To head it off at the pass... (Score:5, Informative)
The reason we bash Microsoft for its bugs and security holes is not because they have bugs and holes; the reason is that Microsoft paints itself as the savior of computing, as software that will make your life infallibly better and easier, and along the way has made quite a lot of unethical business decisions. They basically brag about how uber they are, and then they release crappy software and frequently take forever to fix certain bugs (or simply never fix them -- e.g. PNG transparency in IE. What's it at, 3 years and counting? 4?).
The guys who write open source stuff like GdkPixBuf, on the other hand, have not (to my knowledge) done these things. They are thus not deserving of scorn; they write software, release it, and say, "I wrote this because I needed it. If you want to try it out, here you go. Have fun; I don't promise anything."
That's why we mock Microsoft for its bugs and not the GDK team.
(To be fair, I'm certain that there are some OS projects whose developers are as arrogant as Microsoft, but they at least do not have the unethical business history Microsoft does, nor do they (still!) have a monopoly on desktop OSes that they continue to abuse to the detriment of everyone except themselves. It's one thing to be an asshole when you're nobody important; it's quite another when you have a great deal of power.)
Re:To head it off at the pass... (Score:2)
Um, actually I haven't seen it once in this thread yet. You sure this is the right thread?
Re:To head it off at the pass... (Score:2, Informative)
(Note: I'm not pro-Windows, I use Slackware [slackware.com] on a daily basis, but I'm just tired of people claiming the above as a bug)
Re:To head it off at the pass... (Score:2)
Re:To head it off at the pass... (Score:2)
Re:To head it off at the pass... (Score:2)
Re:To head it off at the pass... (Score:2)
Re:To head it off at the pass... (Score:2)
I would think that whether or not OSS development methods are inherently more secure (or stable, or featureful, or efficient, etc.) than closed development methods is a separate argument from whether Microsoft deserves extra scorn because of its attitude
Re:To head it off at the pass... (Score:2)
Illiterate cowardly scum, train thyself to read.
Re:We don't need developers to brag, /. (Score:2)
What software has "the Slashdot crowd" released, exactly? I wasn't aware they were working on any collective projects.
All known Mozilla bugs are listed on Bugzilla, aren't they? It may
Re:To head it off at the pass... (Score:2)
OSS isn't a monolithic group, like Microsoft. It's comprised of hundreds of thousands of separate developers working on tens of thousands of projects. Which of those developers are making this claim?
Which OSS projects have made this claim?
Again, which OSS projects have made this claim? There are definitely OSS fanboys who like to trumpet OSS, but in my experience,
crowded theater (Score:2)
Re:crowded theater (Score:2)
Re:crowded theater (Score:2)
It would be useful... (Score:3, Interesting)
--
A neighborhood's tale [elmwoodstrip.com]
Not Remotely Exploitable in Firefox (Score:5, Informative)
--Asa
strace time (Score:2)
Firstly, (Score:2)
Re:Not Remotely Exploitable in Firefox (Score:2)
Re:Not Remotely Exploitable in Firefox (Score:2, Interesting)
Wouldn't that fall under the banner of exploitable?
Are these theme files automatically associated for download with Firefox?
Could somebody build a webpage offering downloads of these, or even get one onto the theme manager listing?
All pretty far out, but at least possible.
This is like finding out a nasty flu is going round. There is an exploit in something I use, I do not feel comfortable using it even though norma
Overflow testing (Score:3, Insightful)
Difficult, impossible. Helpful or useless?
I'd imagine that with such tools hackers could also test your code for overflows, but if it became mainstream to hardcore test for such things then perhaps they wouldn't have the opportunity.
Re:Overflow testing (Score:5, Informative)
You could run something like lint to catch common C errors.
Better than that though is to profile your code actually running, to see buffer overflows and leaks that actually occur (google for valgrind).
But most of these exploits are specially crafted input that produce buffer overflows. Typical input won't. So it is very hard to test for buffer overflows.
The only 100% way to work these kinds of problems out is to write code in higher level languages, so at least you'll get an exception and fail closed in the case of a buffer overflow.
But in C, the only way to resolve these problems is
1) Don't write code with buffer overflows (hard)
2) Find and fix buffer overflows in code review (harder)
3) Write good enough negative test cases that you find the buffer overflows (really hard for even a good tester).
Security through diversity ... (Score:3, Insightful)
Most of the exploits (ie actual "exploits") depend on the EIP or some other register being clobbered or the stack being smashed to execute a data block. Metasploit has a nice database of such clobberable locations [metasploit.com] for Windows
So if you compile your own stuff with your own "-O3 -fomit-frame-pointer -fstack-protector", you may be breaking the binary compatibility of exploit :).
Most ordinary exploits will fail fo
Such apps exist... (Score:4, Informative)
A more general prevention method is to use an environment that doesn't allow buffer overflows; as Java proponents never tire of pointing out, Java guards against this type of attack. There are C libraries which do similar things, IIRC; StackGuard was one such method, though it seems to haved faded into obscurity.
As to your suggestion of a static source code check for unsafe programming practices, there are programs that do that too. GCC itself includes a number of warnings that pop up if you use inherently unsafe C library functions, like gets() (which is buffer overflow in a can...).
SuSE (Score:2, Informative)
Thanks YaST!
Breaks VMWare Workstation 4.x (Score:2)
I'd guess this pixbuf is used to draw the widgets in XWindows. Here's a thread on this. [vmware.com]
I had to go through some contortions to get yum to retrograde my FC laptop and get VMWare (a show-stopper if not working) going.
Since now there's a *new* vulnerability, I'm waiting until the dust settles and this is reasonably resolved before I try this again.
Fi
Very similar (Score:4, Interesting)
I wonder of someone has been stealing source code?
Not at all similar (Score:3, Insightful)
I wonder of someone has been stealing source code?
While it is possible Microsoft may have violated the licenses of open source and free software projects, it is doubtful. It is virtually certain that the opposite is not the case, unless Microsoft lackeys are deliberately trying to poison the well, in which case a court would find the Microsoft willfully released the code into the wild, effectively licensing it. That isn't ve
Re:What the hell (Score:4, Insightful)
Either learn to write safe C or switch to a safer language.
Re:What the hell (Score:5, Insightful)
Solving algorithm-deficiencies by throwing more iron at it is a short-term solution that is bound to come back and bite you in the tail sooner or later.
Learn to write safe C and make sure your algorithms are sound and healthy.
Re:What the hell (Score:3, Funny)
Relying on high level languages like C seems like a good idea because of development time and security but eventually program complexity will outpace hardware speed increases and you will be screwed!
A real programmer doesn't need to waste resources on bloated handholding crap like "C". A real programmer uses assembly to avoid writing bloated code!
Re:What the hell (Score:2)
You know what they said when they came out with Fortran (for general programming) and later C (for systems programming). "Learn to write safe assembly and make sure your algorithms are sound and healthy, instead of taking the speed hit of using a high-level language." Sigh. How many C exploits is it going to take to learn that this 10 or 15% is worth it?
Re:What the hell (Score:3, Informative)
It's often a bad idea (Score:3, Interesting)
Re:What the hell (Score:3, Insightful)
Re:What the hell (Score:5, Insightful)
Uhhh, no. It is simply "in vogue" to look for vulnerabilities in image format parsers at the moment. Is the trend not obvious?
Soon all the major image libraries will have been examined, all the bugs fixed, and the security gurus will move on to other things. And we'll all benefit from that, because the code will be fixed.
Bitching is counterproductive, don't you think?
Re:What the hell (Score:3, Interesting)
Re:What the hell (Score:3, Insightful)
Re:What the hell (Score:5, Insightful)
I find that alot of people I've worked with in software development have a "get it working, clean it up later" attitude. Usually basic error checking gets thrown in, but "hardcore" security often gets put aside in favour of other projects that need to be done. Thus, I think we end up with a fair amount of possibly shoddy code.
I've never done an audit, because I'm trying to write good code, and it's all I can do to be as "productive" as the others.
I don't think anybody seriously thinks "man, that could be a huge problem! well, nobody will notice".
Re:What the hell (Score:3, Insightful)
Re:What the hell (Score:2)
Why? Buffer overflows can be fixed without breaking software that depends on the flaw, so Microsoft can release a patch without having to get political about it.
The real hard problems are when the flaw is baked in to the interfaces and protocols that people are using, like IP-based security in the old UNIX r*suite apllications that many people *still* use instead of
Re:What are you going to do? Mod me -1, flamebait? (Score:3, Informative)
...patch it before the vulnerability is even announced... not six months later.
Re:What are you going to do? Mod me -1, flamebait? (Score:4, Interesting)
Fix it.
Actually, we can, that's one of the main reasons for the existance of open source.
Re:FC2 fixed already? (Score:3, Informative)
Re:deja-vu (Score:2)