FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  375358
Date:      2014-12-23
Time:      21:24:55Z
Committer: rea

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
92442c4b-6f4a-11db-bd28-0012f06707f0Imlib2 -- multiple image file processing vulnerabilities

Secunia reports:

Some vulnerabilities have been reported in imlib2, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

The vulnerabilities are caused due to unspecified errors within the processing of JPG, ARGB, PNG, LBM, PNM, TIFF, and TGA images. This may be exploited to execute arbitrary code by e.g. tricking a user into opening a specially crafted image file with an application using imlib2.


Discovery 2006-11-03
Entry 2006-11-08
imlib2
lt 20060926_1,1

20903
CVE-2006-4806
CVE-2006-4807
CVE-2006-4808
CVE-2006-4809
910486d5-ba4d-11dd-8f23-0019666436c2imlib2 -- XPM processing buffer overflow vulnerability

Secunia reports:

A vulnerability has been discovered in imlib2, which can be exploited by malicious people to potentially compromise an application using the library.

The vulnerability is caused due to a pointer arithmetic error within the "load()" function provided by the XPM loader. This can be exploited to cause a heap-based buffer overflow via a specially crafted XPM file.

Successful exploitation may allow execution of arbitrary code.


Discovery 2008-11-20
Entry 2008-11-24
imlib2
imlib2-nox11
lt 1.4.1.000_1,2

32371
CVE-2008-5187
http://secunia.com/Advisories/32796/
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505714#15
http://bugzilla.enlightenment.org/show_bug.cgi?id=547
910486d5-ba4d-11dd-8f23-0019666436c2imlib2 -- XPM processing buffer overflow vulnerability

Secunia reports:

A vulnerability has been discovered in imlib2, which can be exploited by malicious people to potentially compromise an application using the library.

The vulnerability is caused due to a pointer arithmetic error within the "load()" function provided by the XPM loader. This can be exploited to cause a heap-based buffer overflow via a specially crafted XPM file.

Successful exploitation may allow execution of arbitrary code.


Discovery 2008-11-20
Entry 2008-11-24
imlib2
imlib2-nox11
lt 1.4.1.000_1,2

32371
CVE-2008-5187
http://secunia.com/Advisories/32796/
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505714#15
http://bugzilla.enlightenment.org/show_bug.cgi?id=547
92442c4b-6f4a-11db-bd28-0012f06707f0Imlib2 -- multiple image file processing vulnerabilities

Secunia reports:

Some vulnerabilities have been reported in imlib2, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

The vulnerabilities are caused due to unspecified errors within the processing of JPG, ARGB, PNG, LBM, PNM, TIFF, and TGA images. This may be exploited to execute arbitrary code by e.g. tricking a user into opening a specially crafted image file with an application using imlib2.


Discovery 2006-11-03
Entry 2006-11-08
imlib2
lt 20060926_1,1

20903
CVE-2006-4806
CVE-2006-4807
CVE-2006-4808
CVE-2006-4809