XLI 未明整数溢出漏洞

漏洞信息详情

XLI 未明整数溢出漏洞

漏洞简介

xli 1.17之前版本中存在多个漏洞,远程攻击者可能会通过源自特定图像属性的\”缓冲区管理错误\”执行任意代码,部分图像属性可能与PPM文件中的整数溢出有关。

漏洞公告

目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:

xli xli 1.17

Debian xli_1.17.0-11woody1_alpha.deb

Debian GNU/Linux 3.0 alias woody

http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_alpha.deb

Debian xli_1.17.0-11woody1_arm.deb

Debian GNU/Linux 3.0 alias woody

http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_arm.deb

Debian xli_1.17.0-11woody1_hppa.deb

Debian GNU/Linux 3.0 alias woody

http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_hppa.deb

Debian xli_1.17.0-11woody1_i386.deb

Debian GNU/Linux 3.0 alias woody

http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_i386.deb

Debian xli_1.17.0-11woody1_ia64.deb

Debian GNU/Linux 3.0 alias woody

http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_ia64.deb

Debian xli_1.17.0-11woody1_m68k.deb

Debian GNU/Linux 3.0 alias woody

http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_m68k.deb

Debian xli_1.17.0-11woody1_mips.deb

Debian GNU/Linux 3.0 alias woody

http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_mips.deb

Debian xli_1.17.0-11woody1_mipsel.deb

Debian GNU/Linux 3.0 alias woody

http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_mipsel.deb

Debian xli_1.17.0-11woody1_powerpc.deb

Debian GNU/Linux 3.0 alias woody

http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_powerpc.deb

Debian xli_1.17.0-11woody1_s390.deb

Debian GNU/Linux 3.0 alias woody

http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_s390.deb

Debian xli_1.17.0-11woody1_sparc.deb

Debian GNU/Linux 3.0 alias woody

http://security.debian.org/pool/updates/main/x/xli/xli_1.17.0-11woody1_sparc.deb

Mandriva xli-1.17.0-4.1.C21mdk.i586.rpm

Mandrake Corporate Server 2.1

http://www1.mandrivalinux.com/en/ftp.php3

Mandriva xli-1.17.0-4.1.C21mdk.x86_64.rpm

Mandrake Corporate Server 2.1/x86_64

http://www1.mandrivalinux.com/en/ftp.php3

Mandriva xli-1.17.0-8.1.101mdk.i586.rpm

Mandrake Linux 10.1

http://www1.mandrivalinux.com/en/ftp.php3

Mandriva xli-1.17.0-8.1.101mdk.x86_64.rpm

Mandrake Linux 10.1/x86_64

http://www1.mandrivalinux.com/en/ftp.php3

Mandriva xli-1.17.0-8.1.102mdk.i586.rpm

Mandrake Linux 10.2

http://www1.mandrivalinux.com/en/ftp.php3

Mandriva xli-1.17.0-8.1.102mdk.x86_64.rpm

Mandrake Linux 10.2/x86_64

http://www1.mandrivalinux.com/en/ftp.php3

Mandriva xli-1.17.0-8.2.C30mdk.i586.rpm

Mandrake Corporate Server 3.0

http://www1.mandrivalinux.com/en/ftp.php3

Mandriva xli-1.17.0-8.2.C30mdk.x86_64.rpm

Mandrake Corporate Server 3.0/x86_64

http://www1.mandrivalinux.com/en/ftp.php3

参考网址

来源: SECUNIA

名称: 14459

链接:http://secunia.com/advisories/14459

来源: DEBIAN

名称: DSA-695

链接:http://www.debian.org/security/2005/dsa-695

来源: GENTOO

名称: GLSA-200503-05

链接:http://security.gentoo.org/glsa/glsa-200503-05.xml

来源: bugs.gentoo.org

链接:http://bugs.gentoo.org/show_bug.cgi?id=79762

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享