Lucene search

K
gentooGentoo FoundationGLSA-200411-12
HistoryNov 07, 2004 - 12:00 a.m.

zgv: Multiple buffer overflows

2004-11-0700:00:00
Gentoo Foundation
security.gentoo.org
15

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.12 Low

EPSS

Percentile

95.4%

Background

zgv is a console image viewer based on svgalib.

Description

Multiple arithmetic overflows have been detected in the image processing code of zgv.

Impact

An attacker could entice a user to open a specially-crafted image file, potentially resulting in execution of arbitrary code with the rights of the user running zgv.

Workaround

There is no known workaround at this time.

Resolution

All zgv users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-gfx/zgv-5.8"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-gfx/zgv< 5.8UNKNOWN

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.12 Low

EPSS

Percentile

95.4%