ghsa-qmhp-j7pr-584c
Vulnerability from github
Published
2022-04-29 02:58
Modified
2022-04-29 02:58
Details
Multiple integer overflows in (1) the xpmParseColors function in parse.c, (2) XpmCreateImageFromXpmImage, (3) CreateXImage, (4) ParsePixels, and (5) ParseAndPutPixels for libXpm before 6.8.1 may allow remote attackers to execute arbitrary code via a malformed XPM image file.
{ "affected": [], "aliases": [ "CVE-2004-0688" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2004-10-20T04:00:00Z", "severity": "HIGH" }, "details": "Multiple integer overflows in (1) the xpmParseColors function in parse.c, (2) XpmCreateImageFromXpmImage, (3) CreateXImage, (4) ParsePixels, and (5) ParseAndPutPixels for libXpm before 6.8.1 may allow remote attackers to execute arbitrary code via a malformed XPM image file.", "id": "GHSA-qmhp-j7pr-584c", "modified": "2022-04-29T02:58:10Z", "published": "2022-04-29T02:58:10Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0688" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17416" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11796" }, { "type": "WEB", "url": "https://usn.ubuntu.com/27-1" }, { "type": "WEB", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000924" }, { "type": "WEB", "url": "http://ftp.x.org/pub/X11R6.8.0/patches/README.xorg-CAN-2004-0687-0688.patch" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2005/May/msg00001.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=109530851323415\u0026w=2" }, { "type": "WEB", "url": "http://scary.beasts.org/security/CESA-2004-003.txt" }, { "type": "WEB", "url": "http://secunia.com/advisories/20235" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57653-1" }, { "type": "WEB", "url": "http://www.debian.org/security/2004/dsa-560" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-200409-34.xml" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-07.xml" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/537878" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:098" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2004_34_xfree86_libs_xshared.html" }, { "type": "WEB", "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00001.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-537.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-004.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/434715/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/11196" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA05-136A.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/1914" } ], "schema_version": "1.4.0", "severity": [] }
Loading...