CAN-2004-0914 describes multiple security holes in libxpm:
Multiple vulnerabilities in libXpm for 6.8.1 and earlier, as used in XFre=
e86
and other packages, include (1) multiple integer overflows, (2) out-of-bo=
unds
memory accesses, (3) directory traversal, (4) shell metacharacter, (5) en=
dless
loops, and (6) memory leaks, which could allow remote attackers to obtain
sensitive information, cause a denial of service (application crash), or
execute arbitary code via a certain XPM image file. NOTE: it is highly li=
kely
that this candidate will be SPLIT into other candidates in the future, per
CVE's content decisions.
lesstif includes code derived from this library that is apparently also
vulnerable. A new upstream release, 0.94.0, fixes these problems:
Message-ID: <email address hidden>
Date: Mon, 7 Feb 2005 15:48:01 -0500
From: Joey Hess <email address hidden>
To: Debian Bug Tracking System <email address hidden>
Subject: multiple security holes in XPM code (CAN-2004-0914)
Package: lesstif1-1
Severity: grave
Tags: security
CAN-2004-0914 describes multiple security holes in libxpm:
Multiple vulnerabilities in libXpm for 6.8.1 and earlier, as used in XFre=
e86
and other packages, include (1) multiple integer overflows, (2) out-of-bo=
unds
memory accesses, (3) directory traversal, (4) shell metacharacter, (5) en=
dless
loops, and (6) memory leaks, which could allow remote attackers to obtain
sensitive information, cause a denial of service (application crash), or
execute arbitary code via a certain XPM image file. NOTE: it is highly li=
kely
that this candidate will be SPLIT into other candidates in the future, per
CVE's content decisions.
lesstif includes code derived from this library that is apparently also
vulnerable. A new upstream release, 0.94.0, fixes these problems:
http:// www.lesstif. org/ReleaseNote s.html
--=20
see shy jo