Описание
Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote attackers to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field.
Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote attackers to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2001-0775
- http://www.debian.org/security/2001/dsa-069
- http://www.debian.org/security/2005/dsa-695
- http://www.gentoo.org/security/en/glsa/glsa-200503-05.xml
- http://www.iss.net/security_center/static/6821.php
- http://www.novell.com/linux/security/advisories/2001_024_xli_txt.html
- http://www.redhat.com/support/errata/RHSA-2001-088.html
- http://www.securityfocus.com/archive/1/195823
- http://www.securityfocus.com/bid/3006
Связанные уязвимости
Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote attackers to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field.
Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote attackers to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field.
Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux all ...
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации