Executive Summary
Summary | |
---|---|
Title | New xloadimage packages fix arbitrary code execution |
Informations | |||
---|---|---|---|
Name | DSA-858 | First vendor Publication | 2005-10-10 |
Vendor | Debian | Last vendor Modification | 2005-10-10 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 5.1 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Ariel Berkman discovered several buffer overflows in xloadimage, a graphics file viewer for X11, that can be exploited via large image titles and cause the execution of arbitrary code. For the old stable distribution (woody) these problems have been fixed in version 4.1-10woody2. For the stable distribution (sarge) these problems have been fixed in version 4.1-14.3. For the unstable distribution (sid) these problems have been fixed in version 4.1-15. We recommend that you upgrade your xloadimage package. |
Original Source
Url : http://www.debian.org/security/2005/dsa-858 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10590 | |||
Oval ID: | oval:org.mitre.oval:def:10590 | ||
Title: | Buffer overflow in xloadimage 4.1 and earlier, and xli, might allow user-assisted attackers to execute arbitrary code via a long title name in a NIFF file, which triggers the overflow during (1) zoom, (2) reduce, or (3) rotate operations. | ||
Description: | Buffer overflow in xloadimage 4.1 and earlier, and xli, might allow user-assisted attackers to execute arbitrary code via a long title name in a NIFF file, which triggers the overflow during (1) zoom, (2) reduce, or (3) rotate operations. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-3178 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200510-26 (xli xloadimage) File : nvt/glsa_200510_26.nasl |
2008-09-04 | Name : FreeBSD Ports: xloadimage File : nvt/freebsd_xloadimage.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 858-1 (xloadimage) File : nvt/deb_858_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 859-1 (xli) File : nvt/deb_859_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
19882 | Xloadimage / xli NIFF Image Title Field Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-07-03 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2005-802.nasl - Type : ACT_GATHER_INFO |
2006-05-13 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_2f0cb4bb416d11da99fe000854d03344.nasl - Type : ACT_GATHER_INFO |
2006-04-26 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200510-26.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Mandrake Linux host is missing a security update. File : mandrake_MDKSA-2005-192.nasl - Type : ACT_GATHER_INFO |
2005-10-19 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2005-802.nasl - Type : ACT_GATHER_INFO |
2005-10-11 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-858.nasl - Type : ACT_GATHER_INFO |
2005-10-11 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-859.nasl - Type : ACT_GATHER_INFO |
2005-10-11 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-981.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:34:31 |
|