FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

nothing found there

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
bfbbd505-3bd6-409c-8c67-445d3635cf4bxli -- integer overflows in image size calculations

Tavis Ormandy discovered several integer overflows in xli's image size handling. A maliciously crafted image may be able to cause a heap buffer overflow and execute arbitrary code.


Discovery 2005-02-08
Entry 2005-06-03
xli
le 1.17.0_1

CVE-2005-0639
http://bugs.gentoo.org/show_bug.cgi?id=79762
http://pantransit.reptiles.org/prog/xli/CHANGES
2f0cb4bb-416d-11da-99fe-000854d03344xloadimage -- buffer overflows in NIFF image title handling

Ariel Berkman reports:

Unlike most of the supported image formats in xloadimage, the NIFF image format can store a title name of arbitrary length as part of the image file.

When xloadimage is processing a loaded image, it is creating a new Image object and then writing the processed image to it. At that point, it will also copy the title from the old image to the newly created image.

The 'zoom', 'reduce', and 'rotate' functions are using a fixed length buffer to construct the new title name when an image processing is done. Since the title name in a NIFF format is of varying length, and there are insufficient buffer size validations, the buffer can be overflowed.


Discovery 2005-10-05
Entry 2005-10-20
Modified 2005-10-23
xloadimage
lt 4.1.15

xli
lt 1.17.0_4

15051
CVE-2005-3178
http://marc.theaimsgroup.com/?l=bugtraq&m=112862493918840&w=2
310d0087-0fde-4929-a41f-96f17c5adffexloadimage -- arbitrary command execution when handling compressed files

Tavis Ormandy discovered that xli and xloadimage attempt to decompress images by piping them through gunzip or similar decompression tools. Unfortunately, the unsanitized file name is included as part of the command. This is dangerous, as in some situations, such as mailcap processing, an attacker may control the input file name. As a result, an attacker may be able to cause arbitrary command execution.


Discovery 2005-02-18
Entry 2005-06-03
xli
le 1.17.0_1

xloadimage
le 4.1.10

CVE-2005-0638
http://bugs.gentoo.org/show_bug.cgi?id=79762
8c1da77d-d3e9-11d9-8ffb-00061bc2ad93xloadimage -- buffer overflow in FACES image handling

In 2001, zen-parse discovered a buffer overflow in xloadimage's FACES image loader. A maliciously crafted image could cause xloadimage to execute arbitrary code. A published exploit exists for this vulnerability.

In 2005, Rob Holland discovered that the same vulnerability was present in xli.


Discovery 2000-02-19
Entry 2005-06-03
xli
le 1.17.0_1

xloadimage
lt 4.1.9

CVE-2001-0775
http://marc.theaimsgroup.com/?l=bugtraq&m=99477230306845
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=46186
http://bugs.gentoo.org/show_bug.cgi?id=79762