search menu icon-carat-right cmu-wordmark

CERT Coordination Center

libXpm image library vulnerable to buffer overflow

Vulnerability Note VU#882750

Original Release Date: 2004-09-30 | Last Revised: 2005-05-12

Overview

libXpm image parsing code contains a buffer overflow vulnerability that may allow an attacker to cause a denial-of-service condition or execute arbitrary code.

Description

X PixMap (XPM) is a format for encoding and decoding images on the X Windows System 11 (X11). libXpm is a library of functions used to manipulate XPM images. There is a stack-based buffer overflow vulnerability in the xpmParseColors() function. This function is used to decode color information stored within a XPM image. Malicious users may be able to exploit this vulnerability by supplying the xpmParseColors() function with a specially crafted XPM image file. Applications that receive input from remote sources may be remotely exploitable.

Any program that uses the libXpm library may be affected by this issue. Users are encouraged to contact their vendors to determine if they are vulnerable.

Impact

Specific impacts depend on the application being attacked. Potential consequences range from abrupt and abnormal program termination to the execution of arbitrary code with the privileges of the compromised program.

Solution

Apply a Patch for X11 Version 6.8.0

The X.org Foundation has released a general patch to address this issue in 6.8.0 available at:


Several vendors of relevant or derived implementations have released patches to address this vulnerability; please contact those vendors for further details.

Upgrade X11

This issue has been corrected in X11 version 6.8.1.

Vendor Information

882750
 

View all 39 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Chris Evans for reporting this vulnerability.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2004-0687
Severity Metric: 5.07
Date Public: 2004-09-16
Date First Published: 2004-09-30
Date Last Updated: 2005-05-12 19:33 UTC
Document Revision: 100

Sponsored by CISA.