Lucene search

K
gentooGentoo FoundationGLSA-200502-07
HistoryFeb 07, 2005 - 12:00 a.m.

OpenMotif: Multiple vulnerabilities in libXpm

2005-02-0700:00:00
Gentoo Foundation
security.gentoo.org
30

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.348 Low

EPSS

Percentile

97.1%

Background

OpenMotif provides a free version of the Motif toolkit for open source applications.

Description

Multiple vulnerabilities, such as buffer overflows, out of bounds memory access or directory traversals, have been discovered in libXpm that is shipped as a part of the X Window System (see GLSA 200409-34 and 200411-28). OpenMotif, an application that includes this library, suffers from the same issues.

Impact

A carefully-crafted XPM file could crash applications making use of the OpenMotif toolkit, potentially allowing the execution of arbitrary code with the privileges of the user running the application.

Workaround

There is no known workaround at this time.

Resolution

All OpenMotif users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose x11-libs/openmotif

Note: You should run ‘revdep-rebuild’ to ensure that all applications linked to OpenMotif are properly rebuilt.

OSVersionArchitecturePackageVersionFilename
Gentooanyallx11-libs/openmotif< 2.2.3-r1UNKNOWN

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.348 Low

EPSS

Percentile

97.1%