Lucene search

K
gentooGentoo FoundationGLSA-200501-09
HistoryJan 06, 2005 - 12:00 a.m.

xzgv: Multiple overflows

2005-01-0600:00:00
Gentoo Foundation
security.gentoo.org
15

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.035

Percentile

91.6%

Background

xzgv is a picture viewer for X, with a thumbnail-based file selector.

Description

Multiple overflows have been found in the image processing code of xzgv, including an integer overflow in the PRF parsing code (CAN-2004-0994).

Impact

An attacker could entice a user to open or browse a specially-crafted image file, potentially resulting in the execution of arbitrary code with the rights of the user running xzgv.

Workaround

There is no known workaround at this time.

Resolution

All xzgv users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-gfx/xzgv-0.8-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-gfx/xzgv<= 0.8UNKNOWN

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.035

Percentile

91.6%