Lucene search

K
mageiaGentoo FoundationMGASA-2023-0031
HistoryFeb 07, 2023 - 3:06 a.m.

Updated libxpm packages fix security vulnerability

2023-02-0703:06:39
Gentoo Foundation
advisories.mageia.org
97
libxpm
security
vulnerability
packages
privilege escalation
denial of service
unix

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.008

Percentile

82.0%

libXpm incorrectly handled calling external helper binaries. If libXpm was being used by a setuid binary, a local attacker could possibly use this issue to escalate privileges. (CVE-2022-4883) libXpm incorrectly handled certain XPM files. If a user or automated system were tricked into opening a specially crafted XPM file, a remote attacker could possibly use this issue to cause libXpm to stop responding, resulting in a denial of service. (CVE-2022-44617, CVE-2022-46285)

OSVersionArchitecturePackageVersionFilename
Mageia8noarchlibxpm< 3.5.15-1libxpm-3.5.15-1.mga8

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.008

Percentile

82.0%