CVE-2004-0688
Summary
| CVE | CVE-2004-0688 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2004-10-20 04:00:00 UTC |
| Updated | 2018-10-19 15:30:00 UTC |
| Description | Multiple integer overflows in (1) the xpmParseColors function in parse.c, (2) XpmCreateImageFromXpmImage, (3) CreateXImage, (4) ParsePixels, and (5) ParseAndPutPixels for libXpm before 6.8.1 may allow remote attackers to execute arbitrary code via a malformed XPM image file. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Openbsd | Openbsd | 3.4 | All | All | All |
| Operating System | Openbsd | Openbsd | 3.5 | All | All | All |
| Operating System | Openbsd | Openbsd | 3.4 | All | All | All |
| Operating System | Openbsd | Openbsd | 3.5 | All | All | All |
| Operating System | Suse | Suse Linux | 8 | All | enterprise_server | All |
| Operating System | Suse | Suse Linux | 8.1 | All | All | All |
| Operating System | Suse | Suse Linux | 8.2 | All | All | All |
| Operating System | Suse | Suse Linux | 9.0 | All | All | All |
| Operating System | Suse | Suse Linux | 9.0 | All | enterprise_server | All |
| Operating System | Suse | Suse Linux | 9.0 | All | x86_64 | All |
| Operating System | Suse | Suse Linux | 9.1 | All | All | All |
| Operating System | Suse | Suse Linux | 8 | All | enterprise_server | All |
| Operating System | Suse | Suse Linux | 8.1 | All | All | All |
| Operating System | Suse | Suse Linux | 8.2 | All | All | All |
| Operating System | Suse | Suse Linux | 9.0 | All | All | All |
| Operating System | Suse | Suse Linux | 9.0 | All | enterprise_server | All |
| Operating System | Suse | Suse Linux | 9.0 | All | x86_64 | All |
| Operating System | Suse | Suse Linux | 9.1 | All | All | All |
| Application | X.org | X11r6 | 6.7.0 | All | All | All |
| Application | X.org | X11r6 | 6.8 | All | All | All |
| Application | X.org | X11r6 | 6.7.0 | All | All | All |
| Application | X.org | X11r6 | 6.8 | All | All | All |
| Application | Xfree86 Project | X11r6 | 3.3.6 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.0 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.0.1 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.0.2.11 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.0.3 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.1.0 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.1.11 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.1.12 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.2.0 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.2.1 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.2.1 | All | errata | All |
| Application | Xfree86 Project | X11r6 | 4.3.0 | All | All | All |
| Application | Xfree86 Project | X11r6 | 3.3.6 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.0 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.0.1 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.0.2.11 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.0.3 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.1.0 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.1.11 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.1.12 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.2.0 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.2.1 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.2.1 | All | errata | All |
| Application | Xfree86 Project | X11r6 | 4.3.0 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Gentoo Linux Documentation -- OpenMotif: Multiple vulnerabilities in libXpm | GENTOO | www.gentoo.org | |
| SecurityFocus | HP | www.securityfocus.com | |
| US-CERT Technical Cyber Security Alert TA05-136A -- Apple Mac OS X is affected by multiple vulnerabilities | CERT | www.us-cert.gov | US Government Resource |
| Debian -- Security Information -- DSA-560-1 lesstif1-1 | DEBIAN | www.debian.org | |
| Resend: APPLE-SA-2005-05-03 Security Update 2005-005 | APPLE | lists.apple.com | |
| 404 Not Found | CONFIRM | ftp.x.org | |
| redhat.com | Red Hat Support | REDHAT | www.redhat.com | |
| rhn.redhat.com | Red Hat Support | REDHAT | www.redhat.com | |
| #57653: libXpm Security Vulnerabilities Affect the Motif Library (libXm) | SUNALERT | sunsolve.sun.com | |
| Gentoo Linux Documentation -- X.org, XFree86: Integer and stack overflows in libXpm | GENTOO | www.gentoo.org | |
| Home - Conectiva | CONECTIVA | distro.conectiva.com.br | |
| scary.beasts.org/security/CESA-2004-003.txt | MISC | scary.beasts.org | |
| Secunia - Advisories - HP-UX Motif Applications libXpm Image Decoding Vulnerabilities | SECUNIA | secunia.com | |
| 'CESA-2004-004: libXpm' - MARC | BUGTRAQ | marc.info | |
| libXpm Image Decoding Multiple Remote Buffer Overflow Vulnerabilities | BID | www.securityfocus.com | Patch, Vendor Advisory |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| Security Announcement | SUSE | www.novell.com | |
| USN-27-1: libxpm4 vulnerability | Ubuntu security notices | UBUNTU | usn.ubuntu.com | |
| US-CERT Vulnerability Note VU#537878 | CERT-VN | www.kb.cert.org | US Government Resource |
| Webmail - OVH | VUPEN | www.vupen.com | |
| [FLSA-2006:152803] Updated lesstif packages fix security issues | FEDORA | www.redhat.com | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| Advisories - Mandriva | MANDRAKE | www.mandriva.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|---|---|---|
| Red Hat | 2007-03-14 | Mark J Cox | Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. |
There are currently no legacy QID mappings associated with this CVE.