SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   libXpm Vendors:   X.org
libXpm Memory Leaks, Overflows, and Input Validation Errors May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1012251
SecurityTracker URL:  http://securitytracker.com/id/1012251
CVE Reference:   CVE-2004-0914   (Links to External Site)
Updated:  Sep 20 2005
Original Entry Date:  Nov 17 2004
Impact:   Denial of service via local system, Denial of service via network, Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): R6.8.1 and prior versions
Description:   Several vulnerabilities were reported in libXpm. A user can create a specially crafted image file that, when processed by libXpm, may cause the application to crash or execute arbitrary code.

The vendor reported that the code contains multipel integer overflows, memory access errors, input validation errors, and logic errors. A remote user may be able to execute shell commands, traverse the directory, and cause denial of service conditions.

Petr Mladek and Thomas Biege are credited with reporting these flaws.

Impact:   A user can create an image file that, when processed by the target application, will cause denial of service conditions or execute arbitrary code on the target system. the specific impact depends on the application that uses libXpm.
Solution:   The vendor has issued a source patch.

For X.Org Release 6.8.0:

http://www.x.org/pub/X11R6.8.0/patches/xorg-680-CVE-2004-0914.patch

For X.Org Release 6.8.1 under:

http://www.x.org/pub/X11R6.8.1/patches/xorg-681-CVE-2004-0914.patch

HP has issued Early Release Patches for HP Tru64 UNIX:

http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTU01228

Vendor URL:  x.org/ (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Nov 17 2004 (SuSE Issues Fix) libXpm Memory Leaks, Overflows, and Input Validation Errors May Let Remote Users Execute Arbitrary Code
SuSE has released a fix.
Nov 19 2004 (Fedora Issues Fix for FC3) libXpm Memory Leaks, Overflows, and Input Validation Errors May Let Remote Users Execute Arbitrary Code
Fedora has released a fix for Fedora Core 3.
Nov 19 2004 (Fedora Issues Fix for FC2) libXpm Memory Leaks, Overflows, and Input Validation Errors May Let Remote Users Execute Arbitrary Code
Fedora has released a fix for Fedora Core 2.
Nov 19 2004 (Gentoo Issues Fix) libXpm Memory Leaks, Overflows, and Input Validation Errors May Let Remote Users Execute Arbitrary Code
Gentoo has released a fix.
Nov 23 2004 (Mandrake Issues Fix) libXpm Memory Leaks, Overflows, and Input Validation Errors May Let Remote Users Execute Arbitrary Code
Mandrake has issued a fix.
Nov 23 2004 (Mandrake Issues Fix) libXpm Memory Leaks, Overflows, and Input Validation Errors May Let Remote Users Execute Arbitrary Code
Mandrake has issued a fix.
Dec 2 2004 (Red Hat Issues Fix for Open Motif) libXpm Memory Leaks, Overflows, and Input Validation Errors May Let Remote Users Execute Arbitrary Code
Red Hat has released a fix for Open Motif on Red Hat Enterprise Linux 2.1 and 3
Dec 10 2004 (Debian Issues Fix for XFree86) libXpm Memory Leaks, Overflows, and Input Validation Errors May Let Remote Users Execute Arbitrary Code
Debian has released a fix for xfree86.
Dec 20 2004 (Red Hat Issues Fix for XFree) libXpm Memory Leaks, Overflows, and Input Validation Errors May Let Remote Users Execute Arbitrary Code
Red Hat has released a fix for XFree86.
Jan 13 2005 (Red Hat Issues Fix for LessTif) libXpm Memory Leaks, Overflows, and Input Validation Errors May Let Remote Users Execute Arbitrary Code
Red Hat has released a fix.
Sep 20 2005 (HP Issues Fix for Tru64 UNIX) libXpm Memory Leaks, Overflows, and Input Validation Errors May Let Remote Users Execute Arbitrary Code
HP has issued a fix for HP Tru64 UNIX.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC