Lucene search

K
osvGoogleOSV:DSA-695-1
HistoryMar 21, 2005 - 12:00 a.m.

xli - buffer overflow, input sanitising, integer overflow

2005-03-2100:00:00
Google
osv.dev
8

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Several vulnerabilities have been discovered in xli, an image viewer
for X11. The Common Vulnerabilities and Exposures project identifies
the following problems:

  • CAN-2001-0775
    A buffer overflow in the decoder for FACES format images could be
    exploited by an attacker to execute arbitrary code. This problem
    has already been fixed in xloadimage in
    DSA 069.

  • CAN-2005-0638
    Tavis Ormandy of the Gentoo Linux Security Audit Team has reported
    a flaw in the handling of compressed images, where shell
    meta-characters are not adequately escaped.

  • CAN-2005-0639
    Insufficient validation of image properties in have been
    discovered which could potentially result in buffer management
    errors.

For the stable distribution (woody) these problems have been fixed in
version 1.17.0-11woody1.

For the unstable distribution (sid) these problems have been fixed in
version 1.17.0-18.

We recommend that you upgrade your xli package.

CPENameOperatorVersion
xlieq1.17.0-11

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P