Buffer overflow in xloadimage 4.1 and earlier, and xli, might allow user-assisted attackers to execute arbitrary code via a long title name in a NIFF file, which triggers the overflow during (1) zoom, (2) reduce, or (3) rotate operations.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Buffer overflow in xloadimage 4.1 and earlier, and xli, might allow user-assisted attackers to execute arbitrary code via a long title name in a NIFF file, which triggers the overflow during (1) zoom, (2) reduce, or (3) rotate operations.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://secunia.com/advisories/18491 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/17143 | third-party-advisory x_refsource_SECUNIA x_transferred |
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.56/SCOSA-2005.56.txt | vendor-advisory x_refsource_SCO x_transferred |
http://secunia.com/advisories/17124 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/17273 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/17282 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/18050 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.mandriva.com/security/advisories?name=MDKSA-2005:192 | vendor-advisory x_refsource_MANDRIVA x_transferred |
http://securitytracker.com/id?1015072 | vdb-entry x_refsource_SECTRACK x_transferred |
http://www.securityfocus.com/bid/15051 | vdb-entry x_refsource_BID x_transferred |
http://secunia.com/advisories/18170 | third-party-advisory x_refsource_SECUNIA x_transferred |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10590 | vdb-entry signature x_refsource_OVAL x_transferred |
http://www.debian.org/security/2005/dsa-859 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://support.avaya.com/elmodocs2/security/ASA-2006-013.htm | x_refsource_CONFIRM x_transferred |
http://secunia.com/advisories/17369 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.gentoo.org/security/en/glsa/glsa-200510-26.xml | vendor-advisory x_refsource_GENTOO x_transferred |
http://www.redhat.com/support/errata/RHSA-2005-802.html | vendor-advisory x_refsource_REDHAT x_transferred |
http://www.novell.com/linux/security/advisories/2005_24_sr.html | vendor-advisory x_refsource_SUSE x_transferred |
http://secunia.com/advisories/17139 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://marc.info/?l=bugtraq&m=112862493918840&w=2 | mailing-list x_refsource_BUGTRAQ x_transferred |
http://secunia.com/advisories/17087/ | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.securityfocus.com/archive/1/433935/30/5010/threaded | vendor-advisory x_refsource_FEDORA x_transferred |
http://www.debian.org/security/2005/dsa-858 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://secunia.com/advisories/17206 | third-party-advisory x_refsource_SECUNIA x_transferred |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.62/SCOSA-2005.62.txt | vendor-advisory x_refsource_SCO x_transferred |
http://secunia.com/advisories/17140 | third-party-advisory x_refsource_SECUNIA x_transferred |
Buffer overflow in xloadimage 4.1 and earlier, and xli, might allow user-assisted attackers to execute arbitrary code via a long title name in a NIFF file, which triggers the overflow during (1) zoom, (2) reduce, or (3) rotate operations.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 5.1 | MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-Other | Primary | nvd@nist.gov |