First published: Wed Jan 25 2017(Updated: )
An out of boundary write has been found in libXpm which can be exploited by an attacker through maliciously crafted XPM files. The affected code is prone to two 32 bit integer overflows while parsing extensions: the amount of extensions and their concatenated length. References: <a href="http://seclists.org/oss-sec/2017/q1/167">http://seclists.org/oss-sec/2017/q1/167</a> Upstream patch: <a href="https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185">https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
X.org Libxpm | <=3.5.11 | |
redhat/libXpm | <3.5.12 | 3.5.12 |
https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.