FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  369686
Date:      2014-10-01
Time:      03:40:03Z
Committer: bdrewery

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
310d0087-0fde-4929-a41f-96f17c5adffexloadimage -- arbitrary command execution when handling compressed files

Tavis Ormandy discovered that xli and xloadimage attempt to decompress images by piping them through gunzip or similar decompression tools. Unfortunately, the unsanitized file name is included as part of the command. This is dangerous, as in some situations, such as mailcap processing, an attacker may control the input file name. As a result, an attacker may be able to cause arbitrary command execution.


Discovery 2005-02-18
Entry 2005-06-03
xli
le 1.17.0_1

xloadimage
le 4.1.10

CVE-2005-0638
http://bugs.gentoo.org/show_bug.cgi?id=79762
2f0cb4bb-416d-11da-99fe-000854d03344xloadimage -- buffer overflows in NIFF image title handling

Ariel Berkman reports:

Unlike most of the supported image formats in xloadimage, the NIFF image format can store a title name of arbitrary length as part of the image file.

When xloadimage is processing a loaded image, it is creating a new Image object and then writing the processed image to it. At that point, it will also copy the title from the old image to the newly created image.

The 'zoom', 'reduce', and 'rotate' functions are using a fixed length buffer to construct the new title name when an image processing is done. Since the title name in a NIFF format is of varying length, and there are insufficient buffer size validations, the buffer can be overflowed.


Discovery 2005-10-05
Entry 2005-10-20
Modified 2005-10-23
xloadimage
lt 4.1.15

xli
lt 1.17.0_4

15051
CVE-2005-3178
http://marc.theaimsgroup.com/?l=bugtraq&m=112862493918840&w=2
310d0087-0fde-4929-a41f-96f17c5adffexloadimage -- arbitrary command execution when handling compressed files

Tavis Ormandy discovered that xli and xloadimage attempt to decompress images by piping them through gunzip or similar decompression tools. Unfortunately, the unsanitized file name is included as part of the command. This is dangerous, as in some situations, such as mailcap processing, an attacker may control the input file name. As a result, an attacker may be able to cause arbitrary command execution.


Discovery 2005-02-18
Entry 2005-06-03
xli
le 1.17.0_1

xloadimage
le 4.1.10

CVE-2005-0638
http://bugs.gentoo.org/show_bug.cgi?id=79762
2f0cb4bb-416d-11da-99fe-000854d03344xloadimage -- buffer overflows in NIFF image title handling

Ariel Berkman reports:

Unlike most of the supported image formats in xloadimage, the NIFF image format can store a title name of arbitrary length as part of the image file.

When xloadimage is processing a loaded image, it is creating a new Image object and then writing the processed image to it. At that point, it will also copy the title from the old image to the newly created image.

The 'zoom', 'reduce', and 'rotate' functions are using a fixed length buffer to construct the new title name when an image processing is done. Since the title name in a NIFF format is of varying length, and there are insufficient buffer size validations, the buffer can be overflowed.


Discovery 2005-10-05
Entry 2005-10-20
Modified 2005-10-23
xloadimage
lt 4.1.15

xli
lt 1.17.0_4

15051
CVE-2005-3178
http://marc.theaimsgroup.com/?l=bugtraq&m=112862493918840&w=2