Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2005-0638
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 7.5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:xli:xli:1.17:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:xli:xli:1.16:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:xli:xli:1.14:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:xli:xli:1.15:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.3:*:ppc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:9.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:4.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.1:*:sparc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:altlinux:alt_linux:2.3:*:compact:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.3:alpha:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.3:*:ppc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.0:*:sparc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:3.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.4:*:i386:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.3:*:i386:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.0:*:i386:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.1:alpha:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.0:*:ppc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:altlinux:alt_linux:2.3:*:junior:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.1:*:spa:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.2:*:i386:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:2.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.3:*:sparc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.1:*:x86:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.debian.org/security/2005/dsa-695
- http://security.gentoo.org/glsa/glsa-200503-05.xml
- http://bugs.gentoo.org/show_bug.cgi?id=79762
- http://secunia.com/advisories/14459
- http://secunia.com/advisories/14462
- http://www.osvdb.org/14365
- http://www.redhat.com/support/errata/RHSA-2005-332.html
- http://support.avaya.com/elmodocs2/security/ASA-2005-134_RHSA-2005-332.pdf
- http://www.securityfocus.com/bid/12712
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1
- http://www.securityfocus.com/archive/1/433935/30/5010/threaded