Lucene search

K
freebsdFreeBSD310D0087-0FDE-4929-A41F-96F17C5ADFFE
HistoryFeb 18, 2005 - 12:00 a.m.

xloadimage -- arbitrary command execution when handling compressed files

2005-02-1800:00:00
vuxml.freebsd.org
20

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

80.9%

Tavis Ormandy discovered that xli and xloadimage attempt to
decompress images by piping them through gunzip
or similar decompression tools. Unfortunately, the
unsanitized file name is included as part of the command.
This is dangerous, as in some situations, such as mailcap
processing, an attacker may control the input file name. As a
result, an attacker may be able to cause arbitrary command
execution.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchxli<= 1.17.0_1UNKNOWN
FreeBSDanynoarchxloadimage<= 4.1.10UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

80.9%