7.1 High
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.017 Low
EPSS
Percentile
87.6%
scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow.
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.5/SCOSA-2006.5.txt
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.57/SCOSA-2005.57.txt
ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U
bugs.gentoo.org/show_bug.cgi?id=83598
bugs.gentoo.org/show_bug.cgi?id=83655
lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
secunia.com/advisories/14460
secunia.com/advisories/18049
secunia.com/advisories/18316
secunia.com/advisories/19624
security.gentoo.org/glsa/glsa-200503-08.xml
securitytracker.com/id?1013339
www.debian.org/security/2005/dsa-723
www.gentoo.org/security/en/glsa/glsa-200503-15.xml
www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00001.html
www.redhat.com/support/errata/RHSA-2005-044.html
www.redhat.com/support/errata/RHSA-2005-198.html
www.redhat.com/support/errata/RHSA-2005-331.html
www.redhat.com/support/errata/RHSA-2005-412.html
www.redhat.com/support/errata/RHSA-2005-473.html
www.redhat.com/support/errata/RHSA-2008-0261.html
www.securityfocus.com/bid/12714
bugs.freedesktop.org/attachment.cgi?id=1909
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10411
usn.ubuntu.com/92-1/
usn.ubuntu.com/97-1/