4 results (0.003 seconds)

CVSS: 5.1EPSS: 2%CPEs: 2EXPL: 0

Buffer overflow in xloadimage 4.1 and earlier, and xli, might allow user-assisted attackers to execute arbitrary code via a long title name in a NIFF file, which triggers the overflow during (1) zoom, (2) reduce, or (3) rotate operations. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.62/SCOSA-2005.62.txt ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.56/SCOSA-2005.56.txt http://marc.info/?l=bugtraq&m=112862493918840&w=2 http://secunia.com/advisories/17087 http://secunia.com/advisories/17124 http://secunia.com/advisories/17139 http://secunia.com/advisories/17140 http://secunia.com/advisories/17143 http://secunia.com/advisories/17206 http://secunia.com/advisories/17273 http://secunia.com& •

CVSS: 7.5EPSS: 1%CPEs: 56EXPL: 0

Multiple vulnerabilities in xli before 1.17 may allow remote attackers to execute arbitrary code via "buffer management errors" from certain image properties, some of which may be related to integer overflows in PPM files. • http://bugs.gentoo.org/show_bug.cgi?id=79762 http://secunia.com/advisories/14459 http://security.gentoo.org/glsa/glsa-200503-05.xml http://www.debian.org/security/2005/dsa-695 •

CVSS: 7.5EPSS: 0%CPEs: 56EXPL: 0

xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command. • http://bugs.gentoo.org/show_bug.cgi?id=79762 http://secunia.com/advisories/14459 http://secunia.com/advisories/14462 http://security.gentoo.org/glsa/glsa-200503-05.xml http://support.avaya.com/elmodocs2/security/ASA-2005-134_RHSA-2005-332.pdf http://www.debian.org/security/2005/dsa-695 http://www.osvdb.org/14365 http://www.redhat.com/support/errata/RHSA-2005-332.html http://www.securityfocus.com/archive/1/433935/30/5010/threaded http://www.securityfocus.com/bi •

CVSS: 7.5EPSS: 27%CPEs: 3EXPL: 3

Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote attackers to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field. • https://www.exploit-db.com/exploits/20998 http://www.debian.org/security/2001/dsa-069 http://www.debian.org/security/2005/dsa-695 http://www.gentoo.org/security/en/glsa/glsa-200503-05.xml http://www.iss.net/security_center/static/6821.php http://www.novell.com/linux/security/advisories/2001_024_xli_txt.html http://www.redhat.com/support/errata/RHSA-2001-088.html http://www.securityfocus.com/archive/1/195823 http://www.securityfocus.com/bid/3006 https:// • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •