GLSA-200409-34 : X.org, XFree86: Integer and stack overflows in libXpm

high Nessus Plugin ID 14821

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200409-34 (X.org, XFree86: Integer and stack overflows in libXpm)

Chris Evans has discovered multiple integer and stack overflow vulnerabilities in the X Pixmap library, libXpm, which is a part of the X Window System. These overflows can be exploited by the execution of a malicious XPM file, which can crash applications that are dependent on libXpm.
Impact :

A carefully-crafted XPM file could crash applications that are linked against libXpm, potentially allowing the execution of arbitrary code with the privileges of the user running the application.
Workaround :

There is no known workaround at this time.

Solution

All X.org users should upgrade to the latest version:
# emerge sync # emerge -pv '>=x11-base/xorg-x11-6.7.0-r2' # emerge '>=x11-base/xorg-x11-6.7.0-r2' All XFree86 users should upgrade to the latest version:
# emerge sync # emerge -pv '>=x11-base/xfree-4.3.0-r7' # emerge '>=x11-base/xfree-4.3.0-r7' Note: Usage of XFree86 is deprecated on the AMD64, HPPA, IA64, MIPS, PPC and SPARC architectures: XFree86 users on those architectures should switch to X.org rather than upgrading XFree86.

See Also

http://www.nessus.org/u?85944399

http://www.nessus.org/u?ba8c3ae8

https://security.gentoo.org/glsa/200409-34

Plugin Details

Severity: High

ID: 14821

File Name: gentoo_GLSA-200409-34.nasl

Version: 1.19

Type: local

Published: 9/27/2004

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:gentoo:linux, p-cpe:/a:gentoo:linux:xfree, p-cpe:/a:gentoo:linux:xorg-x11

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list, Host/Gentoo/arch

Patch Publication Date: 9/27/2004

Reference Information

CVE: CVE-2004-0687, CVE-2004-0688

GLSA: 200409-34