Vulnerability Name: | CVE-2005-0639 (CCN-19752) |
Assigned: | 2005-03-02 |
Published: | 2005-03-02 |
Updated: | 2008-09-05 |
Summary: | Multiple vulnerabilities in xli before 1.17 may allow remote attackers to execute arbitrary code via "buffer management errors" from certain image properties, some of which may be related to integer overflows in PPM files.
|
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Gain Access |
References: | Source: CONFIRM Type: Vendor Advisory http://bugs.gentoo.org/show_bug.cgi?id=79762
Source: MITRE Type: CNA CVE-2005-0639
Source: CCN Type: X.ORG Web site XLI - X11 Image Loading Utility
Source: CCN Type: xli Document 2005/02/27 xli
Source: CCN Type: SA14459 xli Multiple Vulnerabilities
Source: SECUNIA Type: Patch, Vendor Advisory 14459
Source: GENTOO Type: Vendor Advisory GLSA-200503-05
Source: DEBIAN Type: Vendor Advisory DSA-695
Source: DEBIAN Type: DSA-694 xloadimage -- missing input sanitising
Source: DEBIAN Type: DSA-695 xli -- buffer overflow
Source: CCN Type: xloadimage Web page What is Xloadimage?
Source: CCN Type: GLSA-200503-05 xli, xloadimage: Multiple vulnerabilities
Source: CCN Type: OSVDB ID: 14366 xli Unspecified Image Properties Overflow
Source: CCN Type: BID-12713 XLI Unspecified Remote Buffer Mismanagement Vulnerability
Source: XF Type: UNKNOWN xloadimage-image-bo(19752)
Source: SUSE Type: SUSE-SR:2005:012 SUSE Security Summary Report
|
Vulnerable Configuration: | Configuration 1: cpe:/a:xli:xli:1.14:*:*:*:*:*:*:*OR cpe:/a:xli:xli:1.15:*:*:*:*:*:*:*OR cpe:/a:xli:xli:1.16:*:*:*:*:*:*:*OR cpe:/a:xli:xli:1.17:*:*:*:*:*:*:* Configuration 2: cpe:/o:altlinux:alt_linux:2.3:*:compact:*:*:*:*:*OR cpe:/o:altlinux:alt_linux:2.3:*:junior:*:*:*:*:*OR cpe:/o:suse:suse_linux:1.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:2.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:3.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:4.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:4.2:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:4.3:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:4.4:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:5.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:5.1:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:5.2:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:5.3:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.1:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.1:alpha:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.2:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.3:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.3:*:ppc:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.3:alpha:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.4:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.4:*:i386:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.4:*:ppc:*:*:*:*:*OR cpe:/o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.0:*:i386:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.0:*:ppc:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.0:*:sparc:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.0:alpha:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.1:*:spa:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.1:*:sparc:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.1:*:x86:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.1:alpha:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.2:*:i386:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.3:*:i386:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.3:*:ppc:*:*:*:*:*OR cpe:/o:suse:suse_linux:7.3:*:sparc:*:*:*:*:*OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:8.0:*:i386:*:*:*:*:*OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |