Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote attackers to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2001/dsa-069 - | |
References | () http://www.debian.org/security/2005/dsa-695 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200503-05.xml - | |
References | () http://www.iss.net/security_center/static/6821.php - | |
References | () http://www.novell.com/linux/security/advisories/2001_024_xli_txt.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2001-088.html - | |
References | () http://www.securityfocus.com/archive/1/195823 - Exploit, Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/3006 - Exploit, Patch, Vendor Advisory |
Information
Published : 2001-10-18 04:00
Updated : 2024-11-20 23:36
NVD link : CVE-2001-0775
Mitre link : CVE-2001-0775
CVE.ORG link : CVE-2001-0775
JSON object : View
Products Affected
xloadimage
- xloadimage
xli
- xli
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer