Page 2 of 6 results (0.004 seconds)

CVSS: 9.8EPSS: 2%CPEs: 1EXPL: 0

Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which triggers a heap-based buffer overflow. Desbordamientos múltiples de entero en libXpm en versiones anteriores a 3.5.12, cuando un programa solicita interpretar extensiones XPM en una plataforma 64-bit, permiten a atacantes remotos provocar una denegación de servicio (escritura fuera de límites) o ejecutar código arbitrario a través de (1) el número de extensiones o (2) su longitud concatenada en un archivo XPM manipulado, que desencadena un desbordamiento de búfer basado en memoria dinámica. An integer overflow flaw leading to a heap-based buffer overflow was found in libXpm. An attacker could use this flaw to crash an application using libXpm via a specially crafted XPM file. • http://www.debian.org/security/2017/dsa-3772 http://www.openwall.com/lists/oss-security/2017/01/22/2 http://www.openwall.com/lists/oss-security/2017/01/25/7 http://www.securityfocus.com/bid/95785 https://access.redhat.com/errata/RHSA-2017:1865 https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185 https://lists.freedesktop.org/archives/xorg/2016-December/058537.html https://security.gentoo.org/glsa/201701-72 https://access.redhat.com& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •