Lucene search

K
redosRedosROS-20230124-05
HistoryJan 24, 2023 - 12:00 a.m.

ROS-20230124-05

2023-01-2400:00:00
redos.red-soft.ru
12

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

75.2%

A vulnerability in the X Pixmap (XPM) libXpm image file library is related to an infinite loop when processing unclosed comments in XPM images in the ParseComment ( ) function.
loop when processing unclosed comments in XPM images in the ParseComment ( ) function. Exploitation
The vulnerability could allow an attacker acting remotely to open a specially crafted XPM file and
perform a denial of service (DoS) attack.

A vulnerability in the X Pixmap image file (XPM) library libXpm is related to an infinite
loop in the ParsePixels ( ) function when processing XPM files with width set to 0 and a very large height value.
height value. Exploitation of the vulnerability could allow an attacker acting remotely to open a specially crafted XPM file and execute it.
a specially crafted XPM file and perform a denial of service (DoS) attack.

The vulnerability in the X Pixmap image file (XPM) library libXpm is related to the fact that the
library uses the $PATH variable to run the command responsible for unpacking .Z or .gz
files. Exploiting the vulnerability could allow an attacker to execute arbitrary code with elevated
privileges

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64libxpm<= 3.5.15-2UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

75.2%