CVE-2001-0775

Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote attackers to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xli:xli:1.16:*:*:*:*:*:*:*
cpe:2.3:a:xli:xli:1.17:*:*:*:*:*:*:*
cpe:2.3:a:xloadimage:xloadimage:4.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:36

Type Values Removed Values Added
References () http://www.debian.org/security/2001/dsa-069 - () http://www.debian.org/security/2001/dsa-069 -
References () http://www.debian.org/security/2005/dsa-695 - () http://www.debian.org/security/2005/dsa-695 -
References () http://www.gentoo.org/security/en/glsa/glsa-200503-05.xml - () http://www.gentoo.org/security/en/glsa/glsa-200503-05.xml -
References () http://www.iss.net/security_center/static/6821.php - () http://www.iss.net/security_center/static/6821.php -
References () http://www.novell.com/linux/security/advisories/2001_024_xli_txt.html - () http://www.novell.com/linux/security/advisories/2001_024_xli_txt.html -
References () http://www.redhat.com/support/errata/RHSA-2001-088.html - () http://www.redhat.com/support/errata/RHSA-2001-088.html -
References () http://www.securityfocus.com/archive/1/195823 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/archive/1/195823 - Exploit, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/3006 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/3006 - Exploit, Patch, Vendor Advisory

Information

Published : 2001-10-18 04:00

Updated : 2024-11-20 23:36


NVD link : CVE-2001-0775

Mitre link : CVE-2001-0775

CVE.ORG link : CVE-2001-0775


JSON object : View

Products Affected

xli

  • xli

xloadimage

  • xloadimage
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer