DSA-069-1 xloadimage -- buffer overflow

Related Vulnerabilities: CVE-2001-0775  

The version of xloadimage (a graphics files viewer for X) that was shipped in Debian GNU/Linux 2.2 has a buffer overflow in the code that handles FACES format images. This could be exploited by an attacker by tricking someone into viewing a specially crafted image using xloadimage which would allow them to execute arbitrary code. This problem was fixed in version 4.1-5potato1.

Debian Security Advisory

DSA-069-1 xloadimage -- buffer overflow

Date Reported:
09 Aug 2001
Affected Packages:
xloadimage
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 3006.
In Mitre's CVE dictionary: CVE-2001-0775.
More information:
The version of xloadimage (a graphics files viewer for X) that was shipped in Debian GNU/Linux 2.2 has a buffer overflow in the code that handles FACES format images. This could be exploited by an attacker by tricking someone into viewing a specially crafted image using xloadimage which would allow them to execute arbitrary code.

This problem was fixed in version 4.1-5potato1.

Fixed in:

Debian GNU/Linux 2.2 (potato)

Source:
http://security.debian.org/dists/stable/updates/main/source/xloadimage_4.1-5potato1.diff.gz
http://security.debian.org/dists/stable/updates/main/source/xloadimage_4.1-5potato1.dsc
http://security.debian.org/dists/stable/updates/main/source/xloadimage_4.1.orig.tar.gz
Alpha:
http://security.debian.org/dists/stable/updates/main/binary-alpha/xloadimage_4.1-5potato1_alpha.deb
ARM:
http://security.debian.org/dists/stable/updates/main/binary-arm/xloadimage_4.1-5potato1_arm.deb
Intel IA-32:
http://security.debian.org/dists/stable/updates/main/binary-i386/xloadimage_4.1-5potato1_i386.deb
Motorola 680x0:
http://security.debian.org/dists/stable/updates/main/binary-m68k/xloadimage_4.1-5potato1_m68k.deb
PowerPC:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xloadimage_4.1-5potato1_powerpc.deb
Sun Sparc:
http://security.debian.org/dists/stable/updates/main/binary-sparc/xloadimage_4.1-5potato1_sparc.deb

MD5 checksums of the listed files are available in the original advisory.