CVE-2023-43788 – Libxpm: out of bounds read in xpmcreatexpmimagefrombuffer()
https://notcve.org/view.php?id=CVE-2023-43788
A vulnerability was found in libXpm due to a boundary condition within the XpmCreateXpmImageFromBuffer() function. This flaw allows a local attacker to trigger an out-of-bounds read error and read the contents of memory on the system. Se encontró una vulnerabilidad en libXpm debido a una condición de los límite dentro de la función XpmCreateXpmImageFromBuffer(). Esta falla permite que un local active un error de lectura fuera de los límites y lea el contenido de la memoria del sistema. • https://access.redhat.com/errata/RHSA-2024:2146 https://access.redhat.com/errata/RHSA-2024:2217 https://access.redhat.com/errata/RHSA-2024:2974 https://access.redhat.com/errata/RHSA-2024:3022 https://access.redhat.com/security/cve/CVE-2023-43788 https://bugzilla.redhat.com/show_bug.cgi?id=2242248 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63IBRFLQVZSMOAZBZOBKFWJP26ILRAGQ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject. • CWE-125: Out-of-bounds Read •
CVE-2022-4883 – libXpm: compression commands depend on $PATH
https://notcve.org/view.php?id=CVE-2022-4883
A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable. • https://bugzilla.redhat.com/show_bug.cgi?id=2160213 https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/515294bb8023a45ff91669 https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9 https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html https://lists.x.org/archives/xorg-announce/2023-January/003312.html https://access.redhat.com/security/cve/CVE-2022-4883 • CWE-426: Untrusted Search Path •
CVE-2022-46285 – libXpm: Infinite loop on unclosed comments
https://notcve.org/view.php?id=CVE-2022-46285
A flaw was found in libXpm. This issue occurs when parsing a file with a comment not closed; the end-of-file condition will not be detected, leading to an infinite loop and resulting in a Denial of Service in the application linked to the library. Multiple vulnerabilities have been discovered across Common Desktop Environment version 1.6, Motif version 2.1, and X.Org libXpm versions prior to 3.5.15 on Oracle Solaris 10 that can be chained together to achieve root. • http://www.openwall.com/lists/oss-security/2023/10/03/1 http://www.openwall.com/lists/oss-security/2023/10/03/10 https://bugzilla.redhat.com/show_bug.cgi?id=2160092 https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/a3a7c6dcc3b629d7650148 https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9 https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html https://lists.x.org/archives/xorg-announce/2023-January/003312.html https://access.redhat.com& • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •
CVE-2022-44617 – libXpm: Runaway loop on width of 0 and enormous height
https://notcve.org/view.php?id=CVE-2022-44617
A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library. • https://bugzilla.redhat.com/show_bug.cgi?id=2160193 https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28 https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9 https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html https://lists.x.org/archives/xorg-announce/2023-January/003312.html https://access.redhat.com/security/cve/CVE-2022-44617 • CWE-20: Improper Input Validation CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •
CVE-2016-10164 – libXpm: Out-of-bounds write in XPM extension parsing
https://notcve.org/view.php?id=CVE-2016-10164
Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which triggers a heap-based buffer overflow. Desbordamientos múltiples de entero en libXpm en versiones anteriores a 3.5.12, cuando un programa solicita interpretar extensiones XPM en una plataforma 64-bit, permiten a atacantes remotos provocar una denegación de servicio (escritura fuera de límites) o ejecutar código arbitrario a través de (1) el número de extensiones o (2) su longitud concatenada en un archivo XPM manipulado, que desencadena un desbordamiento de búfer basado en memoria dinámica. An integer overflow flaw leading to a heap-based buffer overflow was found in libXpm. An attacker could use this flaw to crash an application using libXpm via a specially crafted XPM file. • http://www.debian.org/security/2017/dsa-3772 http://www.openwall.com/lists/oss-security/2017/01/22/2 http://www.openwall.com/lists/oss-security/2017/01/25/7 http://www.securityfocus.com/bid/95785 https://access.redhat.com/errata/RHSA-2017:1865 https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185 https://lists.freedesktop.org/archives/xorg/2016-December/058537.html https://security.gentoo.org/glsa/201701-72 https://access.redhat.com& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •