GLSA Bodhisattva
Joined: 17 Apr 2002 Posts: 2602 Location: Baltimore, MD
|
Posted: Wed Mar 02, 2005 7:03 pm Post subject: [ GLSA 200503-05 ] xli, xloadimage: Multiple vulnerabilities |
|
|
Gentoo Linux Security Advisory
Title: xli, xloadimage: Multiple vulnerabilities (GLSA 200503-05)
Severity: normal
Exploitable: remote
Date: March 02, 2005
Updated: May 22, 2006
Bug(s): #79762
ID: 200503-05
Synopsis
xli and xloadimage are vulnerable to multiple issues, potentially leading
to the execution of arbitrary code.
Background
xli and xloadimage are X11 utilities for displaying and manipulating a
wide range of image formats.
Affected Packages
Package: media-gfx/xloadimage
Vulnerable: < 4.1-r2
Unaffected: >= 4.1-r2
Architectures: All supported architectures
Package: media-gfx/xli
Vulnerable: < 1.17.0-r1
Unaffected: >= 1.17.0-r1
Architectures: All supported architectures
Description
Tavis Ormandy of the Gentoo Linux Security Audit Team has reported that
xli and xloadimage contain a flaw in the handling of compressed images,
where shell meta-characters are not adequately escaped. Rob Holland of
the Gentoo Linux Security Audit Team has reported that an xloadimage
vulnerability in the handling of Faces Project images discovered by
zen-parse in 2001 remained unpatched in xli. Additionally, it has been
reported that insufficient validation of image properties in xli could
potentially result in buffer management errors.
Impact
Successful exploitation would permit a remote attacker to execute
arbitrary shell commands, or arbitrary code with the privileges of the
xloadimage or xli user.
Workaround
There is no known workaround at this time.
Resolution
All xli users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=media-gfx/xli-1.17.0-r1" |
All xloadimage users should also upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=media-gfx/xloadimage-4.1-r2" |
References
CAN-2001-0775
CVE-2005-0638
CVE-2005-0639
Last edited by GLSA on Wed May 09, 2012 4:18 am; edited 6 times in total |
|