Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.53748 |
Category: | Debian Local Security Checks |
Title: | Debian Security Advisory DSA 695-1 (xli) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to xli announced via advisory DSA 695-1. Several vulnerabilities have been discovered in xli, an image viewer for X11. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2001-0775 A buffer overflow in the decoder for FACES format images could be exploited by an attacker to execute arbitrary code. This problem has been fixed in xloadimage in DSA 069 already. CVE-2005-0638 Tavis Ormandy of the Gentoo Linux Security Audit Team has reported a flaw in the handling of compressed images, where shell meta-characters are not adequately escaped. CVE-2005-0639 Insufficient validation of image properties in have been discovered which could potentially result in buffer management errors. For the stable distribution (woody) these problems have been fixed in version 1.17.0-11woody1. For the unstable distribution (sid) these problems have been fixed in version 1.17.0-18. We recommend that you upgrade your xli package. Solution: http://www.securityspace.com/smysecure/catid.html?in=DSA%20695-1 CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
BugTraq ID: 3006 Common Vulnerability Exposure (CVE) ID: CVE-2001-0775 http://www.securityfocus.com/bid/3006 Bugtraq: 20010710 xloadimage remote exploit - tstot.c (Google Search) http://www.securityfocus.com/archive/1/195823 Debian Security Information: DSA-069 (Google Search) http://www.debian.org/security/2001/dsa-069 Debian Security Information: DSA-695 (Google Search) http://www.debian.org/security/2005/dsa-695 http://www.gentoo.org/security/en/glsa/glsa-200503-05.xml http://www.redhat.com/support/errata/RHSA-2001-088.html SuSE Security Announcement: SA:2001:024 (Google Search) http://www.novell.com/linux/security/advisories/2001_024_xli_txt.html http://www.iss.net/security_center/static/6821.php Common Vulnerability Exposure (CVE) ID: CVE-2005-0638 BugTraq ID: 12712 http://www.securityfocus.com/bid/12712 http://www.securityfocus.com/archive/1/433935/30/5010/threaded http://security.gentoo.org/glsa/glsa-200503-05.xml http://www.osvdb.org/14365 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10898 http://www.redhat.com/support/errata/RHSA-2005-332.html http://secunia.com/advisories/14459 http://secunia.com/advisories/14462 Common Vulnerability Exposure (CVE) ID: CVE-2005-0639 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |