|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 695-1 (xli)|
The remote host is missing an update to xli
announced via advisory DSA 695-1.
Several vulnerabilities have been discovered in xli, an image viewer
for X11. The Common Vulnerabilities and Exposures project identifies
the following problems:
A buffer overflow in the decoder for FACES format images could be
exploited by an attacker to execute arbitrary code. This problem
has been fixed in xloadimage in DSA 069 already.
Tavis Ormandy of the Gentoo Linux Security Audit Team has reported
a flaw in the handling of compressed images, where shell
meta-characters are not adequately escaped.
Insufficient validation of image properties in have been
discovered which could potentially result in buffer management
For the stable distribution (woody) these problems have been fixed in
For the unstable distribution (sid) these problems have been fixed in
We recommend that you upgrade your xli package.
BugTraq ID: 3006|
Common Vulnerability Exposure (CVE) ID: CVE-2001-0775
Bugtraq: 20010710 xloadimage remote exploit - tstot.c (Google Search)
Debian Security Information: DSA-069 (Google Search)
Debian Security Information: DSA-695 (Google Search)
SuSE Security Announcement: SA:2001:024 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2005-0638
BugTraq ID: 12712
Common Vulnerability Exposure (CVE) ID: CVE-2005-0639
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.