aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml35
1 files changed, 35 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index c77602403afe..79386f83e498 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,41 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="310d0087-0fde-4929-a41f-96f17c5adffe">
+ <topic>xloadimage -- arbitrary command execution when handling
+ compressed files</topic>
+ <affects>
+ <package>
+ <name>xli</name>
+ <range><le>1.17.0_1</le></range>
+ </package>
+ <package>
+ <name>xloadimage</name>
+ <range><le>4.1.10</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Tavis Ormandy discovered that xli and xloadimage attempt to
+ decompress images by piping them through <code>gunzip</code>
+ or similar decompression tools. Unfortunately, the
+ unsanitized file name is included as part of the command.
+ This is dangerous, as in some situations, such as mailcap
+ processing, an attacker may control the input file name. As a
+ result, an attacker may be able to cause arbitrary command
+ execution.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CAN-2005-0638</cvename>
+ <url>http://bugs.gentoo.org/show_bug.cgi?id=79762</url>
+ </references>
+ <dates>
+ <discovery>2005-02-18</discovery>
+ <entry>2005-06-03</entry>
+ </dates>
+ </vuln>
+
<vuln vid="8c1da77d-d3e9-11d9-8ffb-00061bc2ad93">
<topic>xloadimage -- buffer overflow in FACES image handling</topic>
<affects>