Vulnerability Description
Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote attackers to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xli | Xli | 1.16 |
| Xloadimage | Xloadimage | 4.1 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2001/dsa-069
- http://www.debian.org/security/2005/dsa-695
- http://www.gentoo.org/security/en/glsa/glsa-200503-05.xml
- http://www.iss.net/security_center/static/6821.php
- http://www.novell.com/linux/security/advisories/2001_024_xli_txt.html
- http://www.redhat.com/support/errata/RHSA-2001-088.html
- http://www.securityfocus.com/archive/1/195823ExploitPatchVendor Advisory
- http://www.securityfocus.com/bid/3006ExploitPatchVendor Advisory
- http://www.debian.org/security/2001/dsa-069
- http://www.debian.org/security/2005/dsa-695
- http://www.gentoo.org/security/en/glsa/glsa-200503-05.xml
- http://www.iss.net/security_center/static/6821.php
- http://www.novell.com/linux/security/advisories/2001_024_xli_txt.html
- http://www.redhat.com/support/errata/RHSA-2001-088.html
- http://www.securityfocus.com/archive/1/195823ExploitPatchVendor Advisory
FAQ
What is CVE-2001-0775?
CVE-2001-0775 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote attackers to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field.
How severe is CVE-2001-0775?
CVE-2001-0775 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-0775?
Check the references section above for vendor advisories and patch information. Affected products include: Xli Xli, Xloadimage Xloadimage.