Bugzilla – Full Text Bug Listing |
Summary: | VUL-0: xloadimage/xli: buffer overflow | ||
---|---|---|---|
Product: | [openSUSE] SUSE Linux 10.1 | Reporter: | Thomas Biege <thomas> |
Component: | X11 Applications | Assignee: | Security Team bot <security-team> |
Status: | RESOLVED FIXED | QA Contact: | Stefan Dirsch <sndirsch> |
Severity: | Normal | ||
Priority: | P5 - None | CC: | patch-request, security-team |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | All | ||
Whiteboard: | CVE-2005-3178: CVSS v2 Base Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P) | ||
Found By: | Other | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Attachments: |
large.niff.gz
small.niff |
Description
Thomas Biege
2005-10-10 09:39:52 UTC
Created attachment 52071 [details]
large.niff.gz
Created attachment 52072 [details]
small.niff
====================================================== Candidate: CAN-2005-3178 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3178 Reference: BUGTRAQ:20051005 xloadimage buffer overflow. Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=112862493918840&w=2 Buffer overflow in xloadimage 4.1 and earlier might allow user-complicit attackers to execute arbitrary code via (1) a long title name in a NIFF file, which triggers the overflow during (1) zoom, (2) reduce, or (3) rotate operations. I will look at it. I'm not sure if this bug in xloadimage can affect xli. Security team : Can you please enlighten this problem? P.S. The link http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3178 seemed to be broken. Yes it is indeed broken. Maybe due to the database change. Please have a look at this Debian advisory: -------------------------------------------------------------------------- Debian Security Advisory DSA 859-1 security@debian.org http://www.debian.org/security/ Martin Schulze October 10th, 2005 http://www.debian.org/security/faq -------------------------------------------------------------------------- Package : xli Vulnerability : buffer overflows Problem type : local (remote) Debian-specific: no CVE ID : CAN-2005-3178 Debian Bug : 332524 Ariel Berkman discovered several buffer overflows in xloadimage, which are also present in xli, a command line utility for viewing images in X11, and could be exploited via large image titles and cause the execution of arbitrary code. For the old stable distribution (woody) these problems have been fixed in version 1.17.0-11woody2. For the stable distribution (sarge) these problems have been fixed in version 1.17.0-18sarge1. For the unstable distribution (sid) these problems will be fixed soon. We recommend that you upgrade your xli package. Upgrade Instructions -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody -------------------------------- Source archives: http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody2.dsc Size/MD5 checksum: 620 0276fa4de8addea1ba22891082860983 http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody2.diff.gz Size/MD5 checksum: 17956 71eaa54284c5a94cd1da8eeb84640158 http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0.orig.tar.gz Size/MD5 checksum: 200070 504f916c9a7d062c8f856f1625634ba8 etc. Many thanks for info. This problem was already partly fixed, but not completely. Submited for STABLE. Do we want to get this fix also for SL 10.0? Yes, for all affected versions >= SL 9.0 + SLES and derivates. I have submited patched xli for these distributions: xli 9.0-all /work/SRC/old-versions/9.0/all/xli /work/src/done/9.0 xli 9.1-all /work/SRC/old-versions/9.1/all/xli /work/src/done/9.1 xli 9.2-all /work/SRC/old-versions/9.2/all/xli /work/src/done/9.2 xli 9.3-all /work/SRC/old-versions/9.3/all/xli /work/src/done/9.3 xli 10.0-all /work/SRC/old-versions/10.0/all/xli /work/src/done/10.0 I assume that patchinfo and SWAMPID will provide security-team. Yes.. 'll do so. Thanks. Maintenance-Tracker-2642 /work/src/done/PATCHINFO/xli.patch.box updates approved, thanks! CVE-2005-3178: CVSS v2 Base Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P) |