First published: Fri Oct 12 2001(Updated: )
Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote attackers to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
xloadimage xloadimage | =4.1 | |
xli xli | =1.17 | |
xli xli | =1.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0775 is considered a critical vulnerability due to its potential for remote code execution.
To fix CVE-2001-0775, upgrade xloadimage to version 4.1.1 or later, or apply vendor-provided patches.
CVE-2001-0775 affects xloadimage version 4.1 and xli versions 1.16 and 1.17.
The potential impacts of CVE-2001-0775 include unauthorized remote code execution which could compromise system integrity.
CVE-2001-0775 can be exploited by remote attackers who can deliver a specially crafted FACES format image.