Mandrake Security Advisory MDVSA-2009:286 (ocaml-camlimages)

Summary
The remote host is missing an update to ocaml-camlimages announced via advisory MDVSA-2009:286.
Solution
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:286
Insight
Multiple vulnerabilities has been found and corrected in ocaml-camlimages: Multiple integer overflows in CamlImages 2.2 and earlier might allow context-dependent attackers to execute arbitrary code via a crafted PNG image with large width and height values that trigger a heap-based buffer overflow in the (1) read_png_file or (2) read_png_file_as_rgb24 function (CVE-2009-2295). Multiple integer overflows in CamlImages 2.2 might allow context-dependent attackers to execute arbitrary code via images containing large width and height values that trigger a heap-based buffer overflow, related to (1) crafted GIF files (gifread.c) and (2) crafted JPEG files (jpegread.c), a different vulnerability than CVE-2009-2295 (CVE-2009-2660). Multiple integer overflows in tiffread.c in CamlImages 2.2 might allow remote attackers to execute arbitrary code via TIFF images containing large width and height values that trigger heap-based buffer overflows (CVE-2009-3296). This update fixes these vulnerabilities. Affected: Enterprise Server 5.0