ID CVE-2008-4316
Summary Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
References
Vulnerable Configurations
  • GNOME Glib 2..2.1
    cpe:2.3:a:gnome:glib:2.2.1
  • GNOME Glib 2.14.5
    cpe:2.3:a:gnome:glib:2.14.5
  • GNOME Glib 2.14.6
    cpe:2.3:a:gnome:glib:2.14.6
  • GNOME Glib 2.16.3
    cpe:2.3:a:gnome:glib:2.16.3
  • GNOME Glib 2.16.4
    cpe:2.3:a:gnome:glib:2.16.4
CVSS
Base: 4.6 (as of 15-03-2009 - 07:33)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-738-1.NASL
    description Diego Petteno discovered that the Base64 encoding functions in GLib did not properly handle large strings. If a user or automated system were tricked into processing a crafted Base64 string, an attacker could possibly execute arbitrary code with the privileges of the user invoking the program. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 36361
    published 2009-04-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=36361
    title Ubuntu 7.10 / 8.04 LTS / 8.10 : glib2.0 vulnerability (USN-738-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_GLIB2-6209.NASL
    description Large strings could lead to a heap overflow in the base64 encoding and decoding functions. Attackers could potentially exploit that to execute arbitrary code (CVE-2008-4316).
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 38181
    published 2009-04-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=38181
    title openSUSE 10 Security Update : glib2 (glib2-6209)
  • NASL family VMware ESX Local Security Checks
    NASL id VMWARE_VMSA-2010-0004_REMOTE.NASL
    description The remote VMware ESX host is missing a security-related patch. It is, therefore, affected by multiple vulnerabilities, including remote code execution vulnerabilities, in several third-party components and libraries : - bind - expat - glib2 - Kernel - newt - nfs-utils - NTP - OpenSSH - OpenSSL
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 89737
    published 2016-03-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=89737
    title VMware ESX Third-Party Libraries Multiple Vulnerabilities (VMSA-2010-0004) (remote check)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_0_GLIB2-090422.NASL
    description Large strings could lead to a heap overflow in the base64 encoding and decoding functions. Attackers could potentially exploit that to execute arbitrary code (CVE-2008-4316).
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 39971
    published 2009-07-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=39971
    title openSUSE Security Update : glib2 (glib2-815)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2009-2657.NASL
    description This update fixes possible integer overflows in the base64 handling code. This has been reported in CVE-2008-4316. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2016-05-11
    plugin id 38159
    published 2009-04-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=38159
    title Fedora 10 : glib2-2.18.4-2.fc10 (2009-2657)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2009-086-02.NASL
    description New glib2 packages are available for Slackware 12.0, 12.1, 12.2, and -current to fix overflows that may be security issues.
    last seen 2018-09-02
    modified 2013-06-01
    plugin id 36038
    published 2009-03-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=36038
    title Slackware 12.0 / 12.1 / 12.2 / current : glib2 (SSA:2009-086-02)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2009-2688.NASL
    description This update fixes possible integer overflows in the base64 handling functions. This has been reported in CVE-2008-4316. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2016-05-11
    plugin id 36068
    published 2009-04-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=36068
    title Fedora 9 : glib2-2.16.6-3.fc9 (2009-2688)
  • NASL family VMware ESX Local Security Checks
    NASL id VMWARE_VMSA-2010-0004.NASL
    description a. vMA and Service Console update for newt to 0.52.2-12.el5_4.1 Newt is a programming library for color text mode, widget based user interfaces. Newt can be used to add stacked windows, entry widgets, checkboxes, radio buttons, labels, plain text fields, scrollbars, etc., to text mode user interfaces. A heap-based buffer overflow flaw was found in the way newt processes content that is to be displayed in a text dialog box. A local attacker could issue a specially crafted text dialog box display request (direct or via a custom application), leading to a denial of service (application crash) or, potentially, arbitrary code execution with the privileges of the user running the application using the newt library. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-2905 to this issue. b. vMA and Service Console update for vMA package nfs-utils to 1.0.9-42.el5 The nfs-utils package provides a daemon for the kernel NFS server and related tools. It was discovered that nfs-utils did not use tcp_wrappers correctly. Certain hosts access rules defined in '/etc/hosts.allow' and '/etc/hosts.deny' may not have been honored, possibly allowing remote attackers to bypass intended access restrictions. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2008-4552 to this issue. c. vMA and Service Console package glib2 updated to 2.12.3-4.el5_3.1 GLib is the low-level core library that forms the basis for projects such as GTK+ and GNOME. It provides data structure handling for C, portability wrappers, and interfaces for such runtime functionality as an event loop, threads, dynamic loading, and an object system. Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either from or to a base64 representation. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2008-4316 to this issue. d. vMA and Service Console update for openssl to 0.9.8e-12.el5 SSL is a toolkit implementing SSL v2/v3 and TLS protocols with full- strength cryptography world-wide. Multiple denial of service flaws were discovered in OpenSSL's DTLS implementation. A remote attacker could use these flaws to cause a DTLS server to use excessive amounts of memory, or crash on an invalid memory access or NULL pointer dereference. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the names CVE-2009-1377, CVE-2009-1378, CVE-2009-1379, CVE-2009-1386, CVE-2009-1387 to these issues. An input validation flaw was found in the handling of the BMPString and UniversalString ASN1 string types in OpenSSL's ASN1_STRING_print_ex() function. An attacker could use this flaw to create a specially crafted X.509 certificate that could cause applications using the affected function to crash when printing certificate contents. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-0590 to this issue. e. vMA and Service Console package bind updated to 9.3.6-4.P1.el5_4.1 It was discovered that BIND was incorrectly caching responses without performing proper DNSSEC validation, when those responses were received during the resolution of a recursive client query that requested DNSSEC records but indicated that checking should be disabled. A remote attacker could use this flaw to bypass the DNSSEC validation check and perform a cache poisoning attack if the target BIND server was receiving such client queries. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-4022 to this issue. f. vMA and Service Console package expat updated to 1.95.8-8.3.el5_4.2. Two buffer over-read flaws were found in the way Expat handled malformed UTF-8 sequences when processing XML files. A specially- crafted XML file could cause applications using Expat to fail while parsing the file. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the names CVE-2009-3560 and CVE-2009-3720 to these issues. g. vMA and Service Console package openssh update to 4.3p2-36.el5_4.2 A Red Hat specific patch used in the openssh packages as shipped in Red Hat Enterprise Linux 5.4 (RHSA-2009:1287) loosened certain ownership requirements for directories used as arguments for the ChrootDirectory configuration options. A malicious user that also has or previously had non-chroot shell access to a system could possibly use this flaw to escalate their privileges and run commands as any system user. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-2904 to this issue. h. vMA and Service Console package ntp updated to ntp-4.2.2p1-9.el5_4.1.i386.rpm A flaw was discovered in the way ntpd handled certain malformed NTP packets. ntpd logged information about all such packets and replied with an NTP packet that was treated as malformed when received by another ntpd. A remote attacker could use this flaw to create an NTP packet reply loop between two ntpd servers through a malformed packet with a spoofed source IP address and port, causing ntpd on those servers to use excessive amounts of CPU time and fill disk space with log messages. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-3563 to this issue. i. vMA update for package kernel to 2.6.18-164.9.1.el5 Updated vMA package kernel addresses the security issues listed below. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2009-2849 to the security issue fixed in kernel 2.6.18-128.2.1 The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-2695, CVE-2009-2908, CVE-2009-3228, CVE-2009-3286, CVE-2009-3547, CVE-2009-3613 to the security issues fixed in kernel 2.6.18-128.6.1 The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-3612, CVE-2009-3620, CVE-2009-3621, CVE-2009-3726 to the security issues fixed in kernel 2.6.18-128.9.1 j. vMA 4.0 updates for the packages kpartx, libvolume-id, device-mapper-multipath, fipscheck, dbus, dbus-libs, and ed kpartx updated to 0.4.7-23.el5_3.4, libvolume-id updated to 095-14.20.el5 device-mapper-multipath package updated to 0.4.7-23.el5_3.4, fipscheck updated to 1.0.3-1.el5, dbus updated to 1.1.2-12.el5, dbus-libs updated to 1.1.2-12.el5, and ed package updated to 0.2-39.el5_2. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the names CVE-2008-3916, CVE-2009-1189 and CVE-2009-0115 to these issues.
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 44993
    published 2010-03-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=44993
    title VMSA-2010-0004 : ESX Service Console and vMA third-party updates
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2009-0336.NASL
    description From Red Hat Security Advisory 2009:0336 : Updated glib2 packages that fix several security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. GLib is the low-level core library that forms the basis for projects such as GTK+ and GNOME. It provides data structure handling for C, portability wrappers, and interfaces for such runtime functionality as an event loop, threads, dynamic loading, and an object system. Diego Petteno discovered multiple integer overflows causing heap-based buffer overflows in GLib's Base64 encoding and decoding functions. An attacker could use these flaws to crash an application using GLib's Base64 functions to encode or decode large, untrusted inputs, or, possibly, execute arbitrary code as the user running the application. (CVE-2008-4316) Note: No application shipped with Red Hat Enterprise Linux 5 uses the affected functions. Third-party applications may, however, be affected. All users of glib2 should upgrade to these updated packages, which contain backported patches to resolve these issues.
    last seen 2019-02-21
    modified 2016-05-26
    plugin id 67816
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=67816
    title Oracle Linux 5 : glib2 (ELSA-2009-0336)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2009-0336.NASL
    description Updated glib2 packages that fix several security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. GLib is the low-level core library that forms the basis for projects such as GTK+ and GNOME. It provides data structure handling for C, portability wrappers, and interfaces for such runtime functionality as an event loop, threads, dynamic loading, and an object system. Diego Petteno discovered multiple integer overflows causing heap-based buffer overflows in GLib's Base64 encoding and decoding functions. An attacker could use these flaws to crash an application using GLib's Base64 functions to encode or decode large, untrusted inputs, or, possibly, execute arbitrary code as the user running the application. (CVE-2008-4316) Note: No application shipped with Red Hat Enterprise Linux 5 uses the affected functions. Third-party applications may, however, be affected. All users of glib2 should upgrade to these updated packages, which contain backported patches to resolve these issues.
    last seen 2019-02-21
    modified 2018-11-27
    plugin id 36015
    published 2009-03-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=36015
    title RHEL 5 : glib2 (RHSA-2009:0336)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2009-080.NASL
    description Multiple integer overflows in GLib's Base64 encoding and decoding functions enable attackers (possibly remote ones, depending on the applications glib2 is linked against with - mostly GNOME ones) either to cause denial of service and to execute arbitrary code via an untrusted input (CVE-2008-4316). This update provide the fix for that security issue.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 36255
    published 2009-04-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=36255
    title Mandriva Linux Security Advisory : glib2.0 (MDVSA-2009:080)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_GLIB2-090422.NASL
    description Large strings could lead to a heap overflow in the base64 encoding and decoding functions. Attackers could potentially exploit that to execute arbitrary code. (CVE-2008-4316)
    last seen 2019-02-21
    modified 2013-10-25
    plugin id 41397
    published 2009-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41397
    title SuSE 11 Security Update : glib2 (SAT Patch Number 817)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20090324_GLIB2_ON_SL5_X.NASL
    description Diego Pettenò discovered multiple integer overflows causing heap-based buffer overflows in GLib's Base64 encoding and decoding functions. An attacker could use these flaws to crash an application using GLib's Base64 functions to encode or decode large, untrusted inputs, or, possibly, execute arbitrary code as the user running the application. (CVE-2008-4316)
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 60552
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=60552
    title Scientific Linux Security Update : glib2 on SL5.x i386/x86_64
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200904-02.NASL
    description The remote host is affected by the vulnerability described in GLSA-200904-02 (GLib: Execution of arbitrary code) Diego E. Petteno` reported multiple integer overflows in glib/gbase64.c when converting a long string from or to a base64 representation. Impact : A remote attacker could entice a user or automated system to perform a base64 conversion via an application using GLib, possibly resulting in the execution of arbitrary code. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 36085
    published 2009-04-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=36085
    title GLSA-200904-02 : GLib: Execution of arbitrary code
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-1747.NASL
    description Diego Petteno discovered that glib2.0, the GLib library of C routines, handles large strings insecurely via its Base64 encoding functions. This could possible lead to the execution of arbitrary code.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 35979
    published 2009-03-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=35979
    title Debian DSA-1747-1 : glib2.0 - integer overflow
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_1_GLIB2-090422.NASL
    description Large strings could lead to a heap overflow in the base64 encoding and decoding functions. Attackers could potentially exploit that to execute arbitrary code (CVE-2008-4316).
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 40222
    published 2009-07-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40222
    title openSUSE Security Update : glib2 (glib2-815)
oval via4
  • accepted 2013-04-29T04:13:49.410-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 5
      oval oval:org.mitre.oval:def:11414
    • comment The operating system installed on the system is CentOS Linux 5.x
      oval oval:org.mitre.oval:def:15802
    • comment Oracle Linux 5.x
      oval oval:org.mitre.oval:def:15459
    description Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
    family unix
    id oval:org.mitre.oval:def:11401
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
    version 19
  • accepted 2014-01-20T04:01:38.808-05:00
    class vulnerability
    contributors
    • name Pai Peng
      organization Hewlett-Packard
    • name Chris Coffin
      organization The MITRE Corporation
    definition_extensions
    comment VMware ESX Server 4.0 is installed
    oval oval:org.mitre.oval:def:6293
    description Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
    family unix
    id oval:org.mitre.oval:def:8360
    status accepted
    submitted 2010-03-18T13:00:53.000-04:00
    title VMware glib2 vulnerability
    version 7
redhat via4
advisories
bugzilla
id 474770
title CVE-2008-4316 glib2: integer overflows in the base64 handling functions (oCERT-2008-015)
oval
AND
  • comment Red Hat Enterprise Linux 5 is installed
    oval oval:com.redhat.rhsa:tst:20070055001
  • OR
    • AND
      • comment glib2 is earlier than 0:2.12.3-4.el5_3.1
        oval oval:com.redhat.rhsa:tst:20090336002
      • comment glib2 is signed with Red Hat redhatrelease key
        oval oval:com.redhat.rhsa:tst:20090336003
    • AND
      • comment glib2-devel is earlier than 0:2.12.3-4.el5_3.1
        oval oval:com.redhat.rhsa:tst:20090336004
      • comment glib2-devel is signed with Red Hat redhatrelease key
        oval oval:com.redhat.rhsa:tst:20090336005
rhsa
id RHSA-2009:0336
released 2009-03-24
severity Moderate
title RHSA-2009:0336: glib2 security update (Moderate)
rpms
  • glib2-0:2.12.3-4.el5_3.1
  • glib2-devel-0:2.12.3-4.el5_3.1
refmap via4
bid 34100
bugtraq
  • 20090312 [oCERT-2008-015] glib and glib-predecessor heap overflows
  • 20090312 rPSA-2009-0045-1 glib
confirm
debian DSA-1747
fedora
  • FEDORA-2009-2657
  • FEDORA-2009-2688
mandriva MDVSA-2009:080
misc
mlist
  • [oss-security] 20090312 [oCERT-2008-015] glib and glib-predecessor heap overflows
  • [oss-security] 20090317 Re: [oCERT-2008-015] glib and glib-predecessor heap overflows
  • [security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates
sectrack 1021884
secunia
  • 34267
  • 34317
  • 34404
  • 34416
  • 34560
  • 34854
  • 34890
  • 38794
  • 38833
suse SUSE-SA:2009:026
ubuntu USN-738-1
vupen ADV-2010-0528
xf glib-gbase64-bo(49272)
Last major update 21-08-2010 - 01:24
Published 14-03-2009 - 14:30
Last modified 11-10-2018 - 16:51
Back to Top