Lucene search

K
gentooGentoo FoundationGLSA-200409-07
HistorySep 03, 2004 - 12:00 a.m.

xv: Buffer overflows in image handling

2004-09-0300:00:00
Gentoo Foundation
security.gentoo.org
20

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.058

Percentile

93.4%

Background

xv is a multi-format image manipulation utility.

Description

Multiple buffer overflow and integer handling vulnerabilities have been discovered in xv’s image processing code. These vulnerabilities have been found in the xvbmp.c, xviris.c, xvpcx.c and xvpm.c source files.

Impact

An attacker might be able to embed malicious code into an image, which would lead to the execution of arbitrary code under the privileges of the user viewing the image.

Workaround

There is no known workaround at this time.

Resolution

All xv users should upgrade to the latest stable version:

 # emerge sync

 # emerge -pv ">=media-gfx/xv-3.10a-r7"
 # emerge ">=media-gfx/xv-3.10a-r7"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-gfx/xv< 3.10a-r7UNKNOWN

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.058

Percentile

93.4%