Lucene search

K
freebsdFreeBSD310D0087-0FDE-4929-A41F-96F17C5ADFFE
HistoryFeb 18, 2005 - 12:00 a.m.

xloadimage -- arbitrary command execution when handling compressed files

2005-02-1800:00:00
vuxml.freebsd.org
22

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.008

Percentile

81.2%

Tavis Ormandy discovered that xli and xloadimage attempt to
decompress images by piping them through gunzip
or similar decompression tools. Unfortunately, the
unsanitized file name is included as part of the command.
This is dangerous, as in some situations, such as mailcap
processing, an attacker may control the input file name. As a
result, an attacker may be able to cause arbitrary command
execution.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchxli<= 1.17.0_1UNKNOWN
FreeBSDanynoarchxloadimage<= 4.1.10UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.008

Percentile

81.2%