Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2001-0775Improper Restriction of Operations within the Bounds of a Memory Buffer in Xloadimage

Severity
7.5HIGHNVD
EPSS
25.6%
top 3.76%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedOct 18
Latest updateApr 30

Description

Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote attackers to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages4 packages

debiandebian/xli< xli 1.17.0-17 (bookworm)
Debianxli/xli< 1.17.0-17+3
NVDxli/xli1.16, 1.17+1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-4cm7-6h7r-qm2p: Buffer overflow in xloadimage 42022-04-30
OSV
CVE-2001-0775: Buffer overflow in xloadimage 42001-10-18

💥Exploits & PoCs

1
Exploit-DB
xloadimage 4.1 - Remote Buffer Overflow2001-07-10

📋Vendor Advisories

2
Red Hat
security flaw2001-07-10
Debian
CVE-2001-0775: xli - Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote...2001

💬Community

1
Bugzilla
CVE-2001-0775 security flaw2018-08-16
CVE-2001-0775 — Xloadimage vulnerability | cvebase