aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authornaddy <naddy@FreeBSD.org>2005-10-20 21:52:35 +0800
committernaddy <naddy@FreeBSD.org>2005-10-20 21:52:35 +0800
commit1b5b9ec4e7fe022cda3c128b87649556b8d2c749 (patch)
treee75216b916e6257de1af7d860b8f944f57c9bfab /security
parentbbb4eab3840ee2cae9f02287da0f790b3e6a13b4 (diff)
downloadfreebsd-ports-gnome-1b5b9ec4e7fe022cda3c128b87649556b8d2c749.tar.gz
freebsd-ports-gnome-1b5b9ec4e7fe022cda3c128b87649556b8d2c749.tar.zst
freebsd-ports-gnome-1b5b9ec4e7fe022cda3c128b87649556b8d2c749.zip
Document x11/xloadimage buffer overflows in NIFF image title handling.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml39
1 files changed, 39 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index cc92a4c308df..30d294d50a26 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,45 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="2f0cb4bb-416d-11da-99fe-000854d03344">
+ <topic>xloadimage -- buffer overflows in NIFF image title handling</topic>
+ <affects>
+ <package>
+ <name>xloadimage</name>
+ <range><lt>4.1.15</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Ariel Berkman reports:</p>
+ <blockquote cite="http://marc.theaimsgroup.com/?l=bugtraq&amp;m=112862493918840&amp;w=2">
+ <p>Unlike most of the supported image formats in xloadimage,
+ the NIFF image format can store a title name of arbitrary
+ length as part of the image file.</p>
+ <p>When xloadimage is processing a loaded image, it is
+ creating a new Image object and then writing the processed
+ image to it. At that point, it will also copy the title
+ from the old image to the newly created image.</p>
+ <p>The 'zoom', 'reduce', and 'rotate' functions are using
+ a fixed length buffer to construct the new title name
+ when an image processing is done. Since the title name
+ in a NIFF format is of varying length, and there are
+ insufficient buffer size validations, the buffer can
+ be overflowed.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>15051</bid>
+ <cvename>CVE-2005-3178</cvename>
+ <mlist msgid="BOEKKJLADFNHIEFBHCECMEONCFAA.aberkm1@uic.edu">http://marc.theaimsgroup.com/?l=bugtraq&amp;m=112862493918840&amp;w=2</mlist>
+ </references>
+ <dates>
+ <discovery>2005-10-05</discovery>
+ <entry>2005-10-20</entry>
+ </dates>
+ </vuln>
+
<vuln vid="97d45e95-3ffc-11da-a263-0001020eed82">
<topic>snort -- Back Orifice preprocessor buffer overflow
vulnerability</topic>