Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2001:073-1: xloadimage


Vulnerability Assessment Details

MDKSA-2001:073-1: xloadimage

Vulnerability Assessment Summary
Check for the version of the xloadimage package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2001:073-1 (xloadimage).


A buffer overflow exists in xli due to missing boundary checks. This could be
triggered by an external attacker to execute commands on the victim's machine.
An exploit is publically available. xli is an image viewer that is used by
Netscape's plugger to display TIFF, PNG, and Sun-Raster images.
Update:
The xloadimage package uses the same code as xli and is likewise vulnerable. An
update is provided for xloadimage which was only provided with Linux-Mandrake
7.2.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2001:073-1
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

DELL POWEREDGE R720 8B 2.5 SERVER E5-2690V2 3.0GHZ 64GB 1.6TB SSD H710
$2539.0
DELL POWEREDGE R720 8B 2.5 SERVER E5-2690V2 3.0GHZ 64GB 1.6TB SSD H710 pictureDELL POWEREDGE R730 8 BAY TWO E5-2643V3 3.4GHZ 384GB 6 X 1.2TB 10K 12G H730
$6419.0
DELL POWEREDGE R730 8 BAY TWO E5-2643V3 3.4GHZ 384GB 6 X 1.2TB 10K 12G H730 pictureDELL POWEREDGE R720 8B 2.5 SERVER E5-2660V2 2.20GHZ 48GB 6 X 300GB 10K SAS H710P
$1999.0
DELL POWEREDGE R720 8B 2.5 SERVER E5-2660V2 2.20GHZ 48GB 6 X 300GB 10K SAS H710P picture


Discussions

No Discussions have been posted on this vulnerability.