ArgyllCMS: User-assisted execution of arbitrary code — GLSA 201402-29

Multiple integer overflow vulnerabilities have been found in ArgyllCMS which could allow attackers to execute arbitrary code.

Affected packages

media-gfx/argyllcms on all architectures
Affected versions < 1.4.0-r1
Unaffected versions >= 1.4.0-r1

Background

ArgyllCMS is an ICC compatible color management system that supports accurate ICC profile creation for scanners, cameras and film recorders.

Description

Multiple integer overflow vulnerabilities have been discovered in the ICC Format Library in ArgyllCMS.

Impact

A remote attacker could entice a user to open a specially crafted image file using ArgyllCMS, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All ArgyllCMS users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-gfx/argyllcms-1.4.0-r1"
 

References

Release date
February 28, 2014

Latest revision
February 28, 2014: 1

Severity
normal

Exploitable
remote

Bugzilla entries