Full Disclosure mailing list archives
[ GLSA 200503-15 ] X.org: libXpm vulnerability
From: Matthias Geerdsen <vorlon () gentoo org>
Date: Sat, 12 Mar 2005 17:50:02 +0100
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200503-15
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: X.org: libXpm vulnerability
Date: March 12, 2005
Updated: March 12, 2005
Bugs: #83598
ID: 200503-15
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
A new vulnerability has been discovered in libXpm, which is included in
X.org, that can potentially lead to remote code execution.
Background
==========
libXpm is a pixmap manipulation library for the X Window System,
included in X.org.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 x11-base/xorg-x11 < 6.8.2-r1 *>= 6.8.0-r5
>= 6.8.2-r1
Description
===========
Chris Gilbert has discovered potentially exploitable buffer overflow
cases in libXpm that weren't fixed in previous libXpm versions.
Impact
======
A carefully-crafted XPM file could crash X.org, potentially allowing
the execution of arbitrary code with the privileges of the user running
the application.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All X.org users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose x11-base/xorg-x11
References
==========
[ 1 ] CAN-2005-0605
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0605
[ 2 ] Freedesktop bug
https://bugs.freedesktop.org/show_bug.cgi?id=1920
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200503-15.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security () gentoo org or alternatively, you may file a bug at
http://bugs.gentoo.org.
License
=======
Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.0
Attachment:
_bin
Description:
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://www.secunia.com/
Current thread:
- [ GLSA 200503-15 ] X.org: libXpm vulnerability Matthias Geerdsen (Mar 12)
