XLI Unspecified Remote Buffer Mismanagement Vulnerability
BID:12713
Info
XLI Unspecified Remote Buffer Mismanagement Vulnerability
| Bugtraq ID: | 12713 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2005-0639 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 02 2005 12:00AM |
| Updated: | Jul 12 2009 10:56AM |
| Credit: | The individual or individuals responsible for the discovery of this issue are currently unknown; the vendor disclosed this issue. |
| Vulnerable: |
xli xli 1.17 xli xli 1.16 xli xli 1.15 xli xli 1.14 SuSE Linux 8.1 SuSE Linux 8.0 i386 SuSE Linux 8.0 SuSE Linux 7.3 sparc SuSE Linux 7.3 ppc SuSE Linux 7.3 i386 SuSE Linux 7.3 SuSE Linux 7.2 i386 SuSE Linux 7.2 SuSE Linux 7.1 x86 SuSE Linux 7.1 sparc SuSE Linux 7.1 ppc SuSE Linux 7.1 alpha SuSE Linux 7.1 SuSE Linux 7.0 sparc SuSE Linux 7.0 ppc SuSE Linux 7.0 i386 SuSE Linux 7.0 alpha SuSE Linux 7.0 SuSE Linux 6.4 ppc SuSE Linux 6.4 i386 SuSE Linux 6.4 alpha SuSE Linux 6.4 SuSE Linux 6.3 ppc SuSE Linux 6.3 alpha SuSE Linux 6.3 SuSE Linux 6.2 SuSE Linux 6.1 alpha SuSE Linux 6.1 SuSE Linux 6.0 SuSE Linux 5.3 SuSE Linux 5.2 SuSE Linux 5.1 SuSE Linux 5.0 SuSE Linux 4.4.1 SuSE Linux 4.4 SuSE Linux 4.3 SuSE Linux 4.2 SuSE Linux 4.0 SuSE Linux 3.0 SuSE Linux 2.0 SuSE Linux 1.0 S.u.S.E. Linux Personal 9.3 S.u.S.E. Linux Personal 9.2 x86_64 S.u.S.E. Linux Personal 9.2 S.u.S.E. Linux Personal 9.1 x86_64 S.u.S.E. Linux Personal 9.1 S.u.S.E. Linux Personal 9.0 x86_64 S.u.S.E. Linux Personal 9.0 S.u.S.E. Linux Personal 8.2 ALT Linux ALT Linux Junior 2.3 ALT Linux ALT Linux Compact 2.3 |
| Not Vulnerable: | |
Discussion
XLI Unspecified Remote Buffer Mismanagement Vulnerability
An unspecified remote buffer mismanagement vulnerability affects xli. This issue is due to a failure of the application to securely manage internal buffers when processing user-supplied input.
An attacker may leverage this issue to execute arbitrary code with the privileges of the affected application, facilitating privilege escalation or unauthorized access.
An unspecified remote buffer mismanagement vulnerability affects xli. This issue is due to a failure of the application to securely manage internal buffers when processing user-supplied input.
An attacker may leverage this issue to execute arbitrary code with the privileges of the affected application, facilitating privilege escalation or unauthorized access.
Exploit / POC
XLI Unspecified Remote Buffer Mismanagement Vulnerability
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution / Fix
XLI Unspecified Remote Buffer Mismanagement Vulnerability
Solution:
ALT Linux has released updates dealing with this and other issues. Please see the reference section for more information.
Gentoo linux has released an advisory (GLSA 200503-05) dealing with this and other issues. Gentoo advises that all xli users should upgrade to the latest version by executing the following commands with superuser privileges:
emerge --sync
emerge --ask --oneshot --verbose ">=media-gfx/xli-1.17.0-r1"
For more information please see the referenced Gentoo linux advisory.
Debian has made advisory DSA 695-1 available along with fixes dealing with this issue. For more information, please see the referenced advisory.
Mandriva has released advisory MDKSA-2005:076 to address this issue. Please see the attached advisory for details on obtaining and applying fixes.
SuSE has released advisory SUSE-SR:2005:012 and fixes for this issue. Fixes can be obtained through the SuSE FTP server or by using the YaST Online Update.
xli xli 1.17
Solution:
ALT Linux has released updates dealing with this and other issues. Please see the reference section for more information.
Gentoo linux has released an advisory (GLSA 200503-05) dealing with this and other issues. Gentoo advises that all xli users should upgrade to the latest version by executing the following commands with superuser privileges:
emerge --sync
emerge --ask --oneshot --verbose ">=media-gfx/xli-1.17.0-r1"
For more information please see the referenced Gentoo linux advisory.
Debian has made advisory DSA 695-1 available along with fixes dealing with this issue. For more information, please see the referenced advisory.
Mandriva has released advisory MDKSA-2005:076 to address this issue. Please see the attached advisory for details on obtaining and applying fixes.
SuSE has released advisory SUSE-SR:2005:012 and fixes for this issue. Fixes can be obtained through the SuSE FTP server or by using the YaST Online Update.
xli xli 1.17
-
Debian xli_1.17.0-11woody1_alpha.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1 _alpha.deb -
Debian xli_1.17.0-11woody1_arm.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1 _arm.deb -
Debian xli_1.17.0-11woody1_hppa.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1 _hppa.deb -
Debian xli_1.17.0-11woody1_i386.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1 _i386.deb -
Debian xli_1.17.0-11woody1_ia64.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1 _ia64.deb -
Debian xli_1.17.0-11woody1_m68k.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1 _m68k.deb -
Debian xli_1.17.0-11woody1_mips.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1 _mips.deb -
Debian xli_1.17.0-11woody1_mipsel.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1 _mipsel.deb -
Debian xli_1.17.0-11woody1_powerpc.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1 _powerpc.deb -
Debian xli_1.17.0-11woody1_s390.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1 _s390.deb -
Debian xli_1.17.0-11woody1_sparc.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1 _sparc.deb -
Mandriva xli-1.17.0-4.1.C21mdk.i586.rpm
Mandrake Corporate Server 2.1
http://www1.mandrivalinux.com/en/ftp.php3 -
Mandriva xli-1.17.0-4.1.C21mdk.x86_64.rpm
Mandrake Corporate Server 2.1/x86_64
http://www1.mandrivalinux.com/en/ftp.php3 -
Mandriva xli-1.17.0-8.1.101mdk.i586.rpm
Mandrake Linux 10.1
http://www1.mandrivalinux.com/en/ftp.php3 -
Mandriva xli-1.17.0-8.1.101mdk.x86_64.rpm
Mandrake Linux 10.1/x86_64
http://www1.mandrivalinux.com/en/ftp.php3 -
Mandriva xli-1.17.0-8.1.102mdk.i586.rpm
Mandrake Linux 10.2
http://www1.mandrivalinux.com/en/ftp.php3 -
Mandriva xli-1.17.0-8.1.102mdk.x86_64.rpm
Mandrake Linux 10.2/x86_64
http://www1.mandrivalinux.com/en/ftp.php3 -
Mandriva xli-1.17.0-8.2.C30mdk.i586.rpm
Mandrake Corporate Server 3.0
http://www1.mandrivalinux.com/en/ftp.php3 -
Mandriva xli-1.17.0-8.2.C30mdk.x86_64.rpm
Mandrake Corporate Server 3.0/x86_64
http://www1.mandrivalinux.com/en/ftp.php3
References
XLI Unspecified Remote Buffer Mismanagement Vulnerability
References:
References:
- [security-announce] I: updated packages available (ALT Linux)
- xli Readme File (X.org)