CVE-2005-3178

NameCVE-2005-3178
DescriptionBuffer overflow in xloadimage 4.1 and earlier, and xli, might allow user-assisted attackers to execute arbitrary code via a long title name in a NIFF file, which triggers the overflow during (1) zoom, (2) reduce, or (3) rotate operations.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-858-1, DSA-859-1
Debian Bugs332524

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
xli (PTS)buster1.17.0+20061110-5fixed
bullseye1.17.0+20061110-6fixed
bookworm, trixie1.17.0+20061110-8fixed
sid1.17.0+20061110-9fixed
xloadimage (PTS)buster, bookworm, bullseye, sid, trixie4.1-25fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
xlisourcewoody1.17.0-11woody2DSA-859-1
xlisourcesarge1.17.0-18sarge1DSA-859-1
xlisource(unstable)1.17.0-20medium
xloadimagesourcewoody4.1-10woody2mediumDSA-858-1332524
xloadimagesourcesarge4.1-14.3DSA-858-1
xloadimagesource(unstable)4.1-15medium332524

Notes

xli couldn't load the provided test images when I checked?

Search for package or bug name: Reporting problems