Rapid7 Vulnerability & Exploit Database

RHSA-2001:088: New xloadimage packages available

Back to Search

RHSA-2001:088: New xloadimage packages available

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
10/18/2001
Created
07/25/2018
Added
10/28/2005
Modified
07/04/2017

Description

These updated packages fix a buffer overflow in the faces reader. This is normally not a security problem; however, xloadimage is called by the 'plugger' program from inside Netscape to handle some image types. Hence, a remote site could cause arbitrary code to be executed as the user running Netscape. It is recommended that users of Netscape and plugger update to the fixed xloadimage packages. Plugger was shipped in Red Hat Powertools 6.2; if you have only installed packages from Red Hat Linux 6.2, you are not vulnerable to this exploit.

A buffer overflow existed in the faces reader for xloadimage. By making a specially constructed invalid faces file, and then having the server serve this file as a .tif file, arbitrary code could be executed on the client computer running Netscape. Thanks go to empathy@feelings.com for bringing this problem to our attention.

Solution(s)

  • redhat-upgrade-xloadimage

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;