First published: Fri Oct 07 2005(Updated: )
Buffer overflow in xloadimage 4.1 and earlier, and xli, might allow user-assisted attackers to execute arbitrary code via a long title name in a NIFF file, which triggers the overflow during (1) zoom, (2) reduce, or (3) rotate operations.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
xli xli | ||
xloadimage xloadimage | <=4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3178 has a high severity rating due to the potential for arbitrary code execution.
To fix CVE-2005-3178, update xloadimage to version 4.2 or later and xli to the latest version available.
CVE-2005-3178 affects xloadimage versions 4.1 and earlier, as well as all versions of xli.
CVE-2005-3178 is a buffer overflow vulnerability that can be triggered by user-assisted actions.
CVE-2005-3178 requires user interaction to exploit, thus it cannot be fully exploited remotely without user assistance.