Vulnerability Bulletins |
Error de validación de entrada en xloadimage |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Obtener acceso |
Dificulty | Experto |
Required attacker level | Acceso remoto sin cuenta a un servicio exotico |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software |
xloadimage xli |
Description |
|
Se ha descubierto un error de validación de entrada en xloadimage y xli, dos visores de imágenes para X11. La vulnerabilidad reside en el manejo de imágenes comprimidas donde es posible insertar comandos shell que no son tratados adecuadamente. La explotación de esta vulnerabilidad podría permitir a un atacante remoto ejecutar código arbitrario mediante un archivo de imagen comprimida especialmente diseñado. El código se ejecutará con los privilegios del usuario que intente visualizar el archivo malicioso. |
|
Solution |
|
Actualización de software Debian Linux (xloadimage) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/x/xloadimage/xloadimage_4.1-10woody1.dsc http://security.debian.org/pool/updates/main/x/xloadimage/xloadimage_4.1-10woody1.diff.gz http://security.debian.org/pool/updates/main/x/xloadimage/xloadimage_4.1.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/x/xloadimage/xloadimage_4.1-10woody1_alpha.deb ARM http://security.debian.org/pool/updates/main/x/xloadimage/xloadimage_4.1-10woody1_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/x/xloadimage/xloadimage_4.1-10woody1_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/x/xloadimage/xloadimage_4.1-10woody1_ia64.deb HP Precision http://security.debian.org/pool/updates/main/x/xloadimage/xloadimage_4.1-10woody1_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/x/xloadimage/xloadimage_4.1-10woody1_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/x/xloadimage/xloadimage_4.1-10woody1_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/x/xloadimage/xloadimage_4.1-10woody1_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/x/xloadimage/xloadimage_4.1-10woody1_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/x/xloadimage/xloadimage_4.1-10woody1_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/x/xloadimage/xloadimage_4.1-10woody1_sparc.deb Debian Linux (xli) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1.dsc http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1.diff.gz http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_alpha.deb ARM http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_ia64.deb HP Precision http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_sparc.deb Red Hat Linux (xloadimage) Red Hat Desktop (v. 3) Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 2.1) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 2.1) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 2.1) Red Hat Enterprise Linux WS (v. 3) Red Hat Enterprise Linux WS (v. 4) Red Hat Linux Advanced Workstation 2.1 Itanium Processor https://rhn.redhat.com/ Mandriva Linux (xli) Mandrakelinux 10.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/xli-1.17.0-8.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/xli-1.17.0-8.1.101mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/xli-1.17.0-8.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/xli-1.17.0-8.1.101mdk.src.rpm Corporate Server 2.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/xli-1.17.0-4.1.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/xli-1.17.0-4.1.C21mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/xli-1.17.0-4.1.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/xli-1.17.0-4.1.C21mdk.src.rpm Corporate Server 3.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/xli-1.17.0-8.2.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/xli-1.17.0-8.2.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/xli-1.17.0-8.2.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/xli-1.17.0-8.2.C30mdk.src.rpm Mandrivalinux LE2005 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/xli-1.17.0-8.1.102mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/SRPMS/xli-1.17.0-8.1.102mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/xli-1.17.0-8.1.102mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/SRPMS/xli-1.17.0-8.1.102mdk.src.rpm SUSE Linux Actualizar mediante YaST Online Update |
|
Standar resources |
|
Property | Value |
CVE | CAN-2005-0638 |
BID | |
Other resources |
|
Debian Security Advisory DSA 694-1 http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00074.html Debian Security Advisory DSA 695-1 http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00075.html Red Hat Security Advisory RHSA-2005:332-10 https://rhn.redhat.com/errata/RHSA-2005-332.html Mandriva Security Advisories MDKSA-2005:076 http://www.mandriva.com/security/advisories?name=MDKSA-2005:076 SUSE Security Summary Report SUSE-SR:2005:012 http://www.novell.com/linux/security/advisories/2005_12_sr.html |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2005-03-22 |
1.1 | Aviso emitido por Red Hat (RHSA-2005:332-10) | 2005-04-20 |
1.2 | Aviso emitido por Mandriva (MDKSA-2005:076) | 2005-04-22 |
1.3 | Aviso emitido por SUSE (SUSE-SR:2005:012) | 2005-05-03 |