FreshPorts - VuXML
This page displays vulnerability information about FreeBSD Ports.
The last vuln.xml file processed by FreshPorts is:
nothing found there
List all Vulnerabilities, by package
List all Vulnerabilities, by date
These are the vulnerabilities relating to the commit you have selected:
|310d0087-0fde-4929-a41f-96f17c5adffe||xloadimage -- arbitrary command execution when handling compressed files|
Tavis Ormandy discovered that xli and xloadimage attempt to
decompress images by piping them through
or similar decompression tools. Unfortunately, the
unsanitized file name is included as part of the command.
This is dangerous, as in some situations, such as mailcap
processing, an attacker may control the input file name. As a
result, an attacker may be able to cause arbitrary command
|2f0cb4bb-416d-11da-99fe-000854d03344||xloadimage -- buffer overflows in NIFF image title handling|
Ariel Berkman reports:
Unlike most of the supported image formats in xloadimage,
the NIFF image format can store a title name of arbitrary
length as part of the image file.
When xloadimage is processing a loaded image, it is
creating a new Image object and then writing the processed
image to it. At that point, it will also copy the title
from the old image to the newly created image.
The 'zoom', 'reduce', and 'rotate' functions are using
a fixed length buffer to construct the new title name
when an image processing is done. Since the title name
in a NIFF format is of varying length, and there are
insufficient buffer size validations, the buffer can