SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   libXpm Vendors:   X.org
LibXpm Integer Overflow in 'lib/scan.c' May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1013339
SecurityTracker URL:  http://securitytracker.com/id/1013339
CVE Reference:   CAN-2005-0605   (Links to External Site)
Date:  Mar 1 2005
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   An integer overflow vulnerability was reported in libXpm. A remote user may be able to cause arbitrary code to be executed.

The 'lib/scan.c' code does not properly validate user-supplied data contained in image files. A remote user can create a specially crafted image file that, when processed by the target user or application, will trigger the overflow and execute arbitrary code.

Negative values in the 'image->bitmap_unit' variable can trigger the overflow.

Impact:   A remote user can create an image that, when processed by libXpm, will execute arbitrary code on the target system.
Solution:   A patch is available at:

https://bugs.freedesktop.org/attachment.cgi?id=1909

Vendor URL:  www.x.org/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
May 12 2005 (Red Hat Issues Fix for Open Motif) LibXpm Integer Overflow in 'lib/scan.c' May Let Remote Users Execute Arbitrary Code
Red Hat has released a fix for Open Motif.
May 26 2005 (Red Hat Issues Fix for LessTif) LibXpm Integer Overflow in 'lib/scan.c' May Let Remote Users Execute Arbitrary Code
Red Hat has released a fix for LessTif.
Jun 8 2005 (Red Hat Issues Fix for xorg-x11) LibXpm Integer Overflow in 'lib/scan.c' May Let Remote Users Execute Arbitrary Code
Red Hat has released a fix for xorg-x11.
Aug 16 2005 (Apple Issues Fix) LibXpm Integer Overflow in 'lib/scan.c' May Let Remote Users Execute Arbitrary Code
Apple has issued a fix for Mac OS X 10.4.2.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC