Home > Security > Advisories

Advisories

Mandriva Advisories

Package name wine
Date January 16th, 2006
Advisory ID MDKSA-2006:014
Affected versions CS3.0, 2006.0
Synopsis Updated wine packages fix WMF vulnerability

Problem Description

A vulnerability was discovered by H D Moore in Wine which implements
the SETABORTPROC GDI Escape function for Windows Metafile (WMF) files.
This could be abused by an attacker who is able to entice a user to
open a specially crafted WMF file from within a Wine-execute Windows
application, possibly resulting in the execution of arbitrary code
with the privileges of the user runing Wine.

The updated packages have been patched to correct these problems.

Updated Packages

Corporate Server 3.0

 a22d48d27955a0b5c8cf7c872a5332ea  corporate/3.0/RPMS/libwine1-20040213-3.1.C30mdk.i586.rpm
 b0214de7c0416e65330c2aa07c7de5ad  corporate/3.0/RPMS/libwine1-capi-20040213-3.1.C30mdk.i586.rpm
 d9abcd416d2bb0f3d1b892f3c58d3432  corporate/3.0/RPMS/libwine1-devel-20040213-3.1.C30mdk.i586.rpm
 6495fbac8ea70deab3b8401b3d83f12d  corporate/3.0/RPMS/libwine1-twain-20040213-3.1.C30mdk.i586.rpm
 5659cd4b240da12ed15644da93c81723  corporate/3.0/RPMS/wine-20040213-3.1.C30mdk.i586.rpm
 c32125932c612311afa5c930af3869ab  corporate/3.0/RPMS/wine-utils-20040213-3.1.C30mdk.i586.rpm
 4611ae314fd47a15f540e1d15021e79d  corporate/3.0/SRPMS/wine-20040213-3.1.C30mdk.src.rpm

Mandriva Linux 2006

 d4f3baabbba81f1bad315bc79dad7e9c  2006.0/RPMS/libwine1-20050725-6.1.20060mdk.i586.rpm
 fc810c3d98a537fce73977c5aa6912ea  2006.0/RPMS/libwine1-capi-20050725-6.1.20060mdk.i586.rpm
 5663e266c34853af09f421897bd778c7  2006.0/RPMS/libwine1-devel-20050725-6.1.20060mdk.i586.rpm
 27052e10ffe276948b7902d9a72aba9a  2006.0/RPMS/libwine1-twain-20050725-6.1.20060mdk.i586.rpm
 02f66be98c0d8bde52bcfeb4e4a4ce2d  2006.0/RPMS/wine-20050725-6.1.20060mdk.i586.rpm
 37780f9798d8da0c4de0a996f65b41b9  2006.0/SRPMS/wine-20050725-6.1.20060mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0106

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.