CVE-2005-0639

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Multiple vulnerabilities in xli before 1.17 may allow remote attackers to execute arbitrary code via "buffer management errors" from certain image properties, some of which may be related to integer overflows in PPM files.

References

http://bugs.gentoo.org/show_bug.cgi?id=79762

http://secunia.com/advisories/14459

http://security.gentoo.org/glsa/glsa-200503-05.xml

http://www.debian.org/security/2005/dsa-695

Details

Source: MITRE

Published: 2005-03-02

Updated: 2008-09-05

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:xli:xli:1.14:*:*:*:*:*:*:*

cpe:2.3:a:xli:xli:1.15:*:*:*:*:*:*:*

cpe:2.3:a:xli:xli:1.16:*:*:*:*:*:*:*

cpe:2.3:a:xli:xli:1.17:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:altlinux:alt_linux:2.3:*:compact:*:*:*:*:*

cpe:2.3:o:altlinux:alt_linux:2.3:*:junior:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:2.0:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:3.0:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:4.0:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:6.1:alpha:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:6.3:*:ppc:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:6.3:alpha:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:6.4:*:i386:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:7.0:*:i386:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:7.0:*:ppc:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:7.0:*:sparc:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:7.1:*:spa:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:7.1:*:sparc:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:7.1:*:x86:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:7.2:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:7.2:*:i386:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:7.3:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:7.3:*:i386:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:7.3:*:ppc:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:7.3:*:sparc:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:9.3:*:*:*:*:*:*:*

Tenable Plugins

View all (6 total)

IDNameProductFamilySeverity
19107FreeBSD : xli -- integer overflows in image size calculations (bfbbd505-3bd6-409c-8c67-445d3635cf4b)NessusFreeBSD Local Security Checks
high
18106Mandrake Linux Security Advisory : xli (MDKSA-2005:076)NessusMandriva Local Security Checks
high
17601Mandrake Linux Security Advisory : MySQL (MDKSA-2005:060)NessusMandriva Local Security Checks
high
17578Debian DSA-695-1 : xli - buffer overflow, input sanitising, integer overflowNessusDebian Local Security Checks
high
17577Debian DSA-694-1 : xloadimage - missing input sanitising, integer overflowNessusDebian Local Security Checks
high
17261GLSA-200503-05 : xli, xloadimage: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high