CentOS 3 / 4 : xloadimage (CESA-2005:332)

high Nessus Plugin ID 21924

Synopsis

The remote CentOS host is missing a security update.

Description

A new xloadimage package that fixes bugs in handling malformed tiff and pbm/pnm/ppm images, and in handling metacharacters in filenames is now available.

This update has been rated as having low security impact by the Red Hat Security Response Team.

The xloadimage utility displays images in an X Window System window, loads images into the root window, or writes images into a file.
Xloadimage supports many image types (including GIF, TIFF, JPEG, XPM, and XBM).

A flaw was discovered in xloadimage where filenames were not properly quoted when calling the gunzip command. An attacker could create a file with a carefully crafted filename so that it would execute arbitrary commands if opened by a victim. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0638 to this issue.

Another bug in xloadimage would cause it to crash if called with certain invalid TIFF, PNM, PBM, or PPM file names.

All users of xloadimage should upgrade to this erratum package which contains backported patches to correct these issues.

Solution

Update the affected xloadimage package.

See Also

http://www.nessus.org/u?3b12ed99

http://www.nessus.org/u?83c219c7

http://www.nessus.org/u?803a5105

Plugin Details

Severity: High

ID: 21924

File Name: centos_RHSA-2005-332.nasl

Version: 1.18

Type: local

Agent: unix

Published: 7/5/2006

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:centos:centos:3, cpe:/o:centos:centos:4, p-cpe:/a:centos:centos:xloadimage

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Patch Publication Date: 4/19/2005

Vulnerability Publication Date: 3/2/2005

Reference Information

CVE: CVE-2005-0638

RHSA: 2005:332