Buffer overflow in xloadimage 4.1 and earlier, and xli, might allow user-assisted attackers to execute arbitrary code via a long title name in a NIFF file, which triggers the overflow during (1) zoom, (2) reduce, or (3) rotate operations.
| Version | Base score | Base severity | Vector |
|---|
| Hyperlink | Resource Type |
|---|
Buffer overflow in xloadimage 4.1 and earlier, and xli, might allow user-assisted attackers to execute arbitrary code via a long title name in a NIFF file, which triggers the overflow during (1) zoom, (2) reduce, or (3) rotate operations.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://secunia.com/advisories/18491 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://secunia.com/advisories/17143 | third-party-advisory x_refsource_SECUNIA x_transferred |
| ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.56/SCOSA-2005.56.txt | vendor-advisory x_refsource_SCO x_transferred |
| http://secunia.com/advisories/17124 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://secunia.com/advisories/17273 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://secunia.com/advisories/17282 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://secunia.com/advisories/18050 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.mandriva.com/security/advisories?name=MDKSA-2005:192 | vendor-advisory x_refsource_MANDRIVA x_transferred |
| http://securitytracker.com/id?1015072 | vdb-entry x_refsource_SECTRACK x_transferred |
| http://www.securityfocus.com/bid/15051 | vdb-entry x_refsource_BID x_transferred |
| http://secunia.com/advisories/18170 | third-party-advisory x_refsource_SECUNIA x_transferred |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10590 | vdb-entry signature x_refsource_OVAL x_transferred |
| http://www.debian.org/security/2005/dsa-859 | vendor-advisory x_refsource_DEBIAN x_transferred |
| http://support.avaya.com/elmodocs2/security/ASA-2006-013.htm | x_refsource_CONFIRM x_transferred |
| http://secunia.com/advisories/17369 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.gentoo.org/security/en/glsa/glsa-200510-26.xml | vendor-advisory x_refsource_GENTOO x_transferred |
| http://www.redhat.com/support/errata/RHSA-2005-802.html | vendor-advisory x_refsource_REDHAT x_transferred |
| http://www.novell.com/linux/security/advisories/2005_24_sr.html | vendor-advisory x_refsource_SUSE x_transferred |
| http://secunia.com/advisories/17139 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://marc.info/?l=bugtraq&m=112862493918840&w=2 | mailing-list x_refsource_BUGTRAQ x_transferred |
| http://secunia.com/advisories/17087/ | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.securityfocus.com/archive/1/433935/30/5010/threaded | vendor-advisory x_refsource_FEDORA x_transferred |
| http://www.debian.org/security/2005/dsa-858 | vendor-advisory x_refsource_DEBIAN x_transferred |
| http://secunia.com/advisories/17206 | third-party-advisory x_refsource_SECUNIA x_transferred |
| ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.62/SCOSA-2005.62.txt | vendor-advisory x_refsource_SCO x_transferred |
| http://secunia.com/advisories/17140 | third-party-advisory x_refsource_SECUNIA x_transferred |
Buffer overflow in xloadimage 4.1 and earlier, and xli, might allow user-assisted attackers to execute arbitrary code via a long title name in a NIFF file, which triggers the overflow during (1) zoom, (2) reduce, or (3) rotate operations.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 5.1 | MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
| CWE ID | Type | Source |
|---|---|---|
| NVD-CWE-Other | Primary | nvd@nist.gov |