Vulnerability Details : CVE-2005-3178
Buffer overflow in xloadimage 4.1 and earlier, and xli, might allow user-assisted attackers to execute arbitrary code via a long title name in a NIFF file, which triggers the overflow during (1) zoom, (2) reduce, or (3) rotate operations.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2005-3178
Probability of exploitation activity in the next 30 days: 2.93%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 89 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-3178
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
References for CVE-2005-3178
- http://www.securityfocus.com/archive/1/433935/30/5010/threaded
-
http://www.gentoo.org/security/en/glsa/glsa-200510-26.xml
-
http://securitytracker.com/id?1015072
-
http://marc.info/?l=bugtraq&m=112862493918840&w=2
-
http://support.avaya.com/elmodocs2/security/ASA-2006-013.htm
-
http://www.securityfocus.com/bid/15051
- http://www.novell.com/linux/security/advisories/2005_24_sr.html
-
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.56/SCOSA-2005.56.txt
-
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.62/SCOSA-2005.62.txt
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10590
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:192
-
http://www.debian.org/security/2005/dsa-859
Patch;Vendor Advisory
-
http://www.debian.org/security/2005/dsa-858
Patch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2005-802.html
Products affected by CVE-2005-3178
- cpe:2.3:a:xli:xli:*:*:*:*:*:*:*:*
- cpe:2.3:a:xloadimage:xloadimage:*:*:*:*:*:*:*:*