blob: d3a5173e4bbf7c268116157b73765750c3d9bb86 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200503-05">
<title>xli, xloadimage: Multiple vulnerabilities</title>
xli and xloadimage are vulnerable to multiple issues, potentially leading
to the execution of arbitrary code.
<product type="ebuild">xli</product>
<announced>March 02, 2005</announced>
<revised>May 22, 2006: 02</revised>
<package name="media-gfx/xloadimage" auto="yes" arch="*">
<unaffected range="ge">4.1-r2</unaffected>
<vulnerable range="lt">4.1-r2</vulnerable>
<package name="media-gfx/xli" auto="yes" arch="*">
<unaffected range="ge">1.17.0-r1</unaffected>
<vulnerable range="lt">1.17.0-r1</vulnerable>
xli and xloadimage are X11 utilities for displaying and manipulating a
wide range of image formats.
Tavis Ormandy of the Gentoo Linux Security Audit Team has reported that
xli and xloadimage contain a flaw in the handling of compressed images,
where shell meta-characters are not adequately escaped. Rob Holland of
the Gentoo Linux Security Audit Team has reported that an xloadimage
vulnerability in the handling of Faces Project images discovered by
zen-parse in 2001 remained unpatched in xli. Additionally, it has been
reported that insufficient validation of image properties in xli could
potentially result in buffer management errors.
<impact type="normal">
Successful exploitation would permit a remote attacker to execute
arbitrary shell commands, or arbitrary code with the privileges of the
xloadimage or xli user.
There is no known workaround at this time.
All xli users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/xli-1.17.0-r1&quot;</code>
All xloadimage users should also upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/xloadimage-4.1-r2&quot;</code>
<uri link="">CAN-2001-0775</uri>
<uri link="">CVE-2005-0638</uri>
<uri link="">CVE-2005-0639</uri>
<metadata tag="requester" timestamp="Mon, 28 Feb 2005 21:34:13 +0000">
<metadata tag="submitter" timestamp="Mon, 28 Feb 2005 22:05:32 +0000">
<metadata tag="bugReady" timestamp="Wed, 2 Mar 2005 16:53:18 +0000">