First published: Wed Jan 11 2023(Updated: )
A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
X.org Libxpm | <3.5.15 | |
redhat/libXpm | <3.5.15 | 3.5.15 |
debian/libxpm | 1:3.5.12-1.1+deb11u1 1:3.5.12-1.1+deb12u1 1:3.5.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4883 is a vulnerability found in libXpm that allows a malicious user to execute other programs by manipulating the PATH environment variable.
The severity of CVE-2022-4883 is high with a CVSS score of 8.8.
CVE-2022-4883 affects the libXpm software by allowing a malicious user to execute other programs through manipulated file extensions.
The recommended remedy for CVE-2022-4883 is to update libXpm to version 3.5.15 or apply the appropriate patch provided by the vendor.
You can find more information about CVE-2022-4883 in the references provided: [link1], [link2], [link3].