CVE-2004-0914

Current Description

Multiple vulnerabilities in libXpm for 6.8.1 and earlier, as used in XFree86 and other packages, include (1) multiple integer overflows, (2) out-of-bounds memory accesses, (3) directory traversal, (4) shell metacharacter, (5) endless loops, and (6) memory leaks, which could allow remote attackers to obtain sensitive information, cause a denial of service (application crash), or execute arbitrary code via a certain XPM image file. NOTE: it is highly likely that this candidate will be SPLIT into other candidates in the future, per CVE's content decisions.

Basic Data

PublishedJanuary 10, 2005
Last ModifiedOctober 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score10.0
SeverityHIGH
Exploitability Score10.0
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationLesstifLesstif0.93*******
    2.3ApplicationLesstifLesstif0.93.12*******
    2.3ApplicationLesstifLesstif0.93.18*******
    2.3ApplicationLesstifLesstif0.93.34*******
    2.3ApplicationLesstifLesstif0.93.36*******
    2.3ApplicationLesstifLesstif0.93.40*******
    2.3ApplicationLesstifLesstif0.93.91*******
    2.3ApplicationLesstifLesstif0.93.94*******
    2.3ApplicationLesstifLesstif0.93.96*******
    2.3ApplicationX.orgX11r66.7.0*******
    2.3ApplicationX.orgX11r66.8*******
    2.3ApplicationX.orgX11r66.8.1*******
    2.3ApplicationXfree86 ProjectX11r63.3*******
    2.3ApplicationXfree86 ProjectX11r63.3.2*******
    2.3ApplicationXfree86 ProjectX11r63.3.3*******
    2.3ApplicationXfree86 ProjectX11r63.3.4*******
    2.3ApplicationXfree86 ProjectX11r63.3.5*******
    2.3ApplicationXfree86 ProjectX11r63.3.6*******
    2.3ApplicationXfree86 ProjectX11r64.0*******
    2.3ApplicationXfree86 ProjectX11r64.0.1*******
    2.3ApplicationXfree86 ProjectX11r64.0.2.11*******
    2.3ApplicationXfree86 ProjectX11r64.0.3*******
    2.3ApplicationXfree86 ProjectX11r64.1.0*******
    2.3ApplicationXfree86 ProjectX11r64.1.11*******
    2.3ApplicationXfree86 ProjectX11r64.1.12*******
    2.3ApplicationXfree86 ProjectX11r64.2.0*******
    2.3ApplicationXfree86 ProjectX11r64.2.1*******
    2.3ApplicationXfree86 ProjectX11r64.2.1*errata*****
    2.3ApplicationXfree86 ProjectX11r64.3.0*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSGentooLinux********
    2.3OSRedhatFedora Corecore_2.0*******
    2.3OSRedhatFedora Corecore_3.0*******
    2.3OSSuseSuse Linux1.0*desktop*****
    2.3OSSuseSuse Linux8*enterprise_server*****
    2.3OSSuseSuse Linux8.1*******
    2.3OSSuseSuse Linux8.2*******
    2.3OSSuseSuse Linux9.0*******
    2.3OSSuseSuse Linux9.0*enterprise_server*****
    2.3OSSuseSuse Linux9.1*******
    2.3OSSuseSuse Linux9.2*******

Vulnerable Software List

VendorProductVersions
Lesstif Lesstif 0.93, 0.93.12, 0.93.18, 0.93.34, 0.93.36, 0.93.40, 0.93.91, 0.93.94, 0.93.96
Redhat Fedora Core core_2.0, core_3.0
X.org X11r6 6.7.0, 6.8, 6.8.1
Xfree86 Project X11r6 3.3, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 4.0, 4.0.1, 4.0.2.11, 4.0.3, 4.1.0, 4.1.11, 4.1.12, 4.2.0, 4.2.1, 4.3.0
Suse Suse Linux 1.0, 8, 8.1, 8.2, 9.0, 9.1, 9.2
Gentoo Linux *

References

NameSourceURLTags
RHSA-2004:537http://rhn.redhat.com/errata/RHSA-2004-537.htmlREDHAT
13224http://secunia.com/advisories/13224/SECUNIAVendor Advisory
DSA-607http://www.debian.org/security/2004/dsa-607DEBIANPatch Vendor Advisory
GLSA-200411-28http://www.gentoo.org/security/en/glsa/glsa-200411-28.xmlGENTOOPatch Vendor Advisory
GLSA-200502-06http://www.gentoo.org/security/en/glsa/glsa-200502-06.xmlGENTOO
GLSA-200502-07http://www.gentoo.org/security/en/glsa/glsa-200502-07.xmlGENTOO
FEDORA-2004-433http://www.linuxsecurity.com/content/view/106877/102/FEDORA
MDKSA-2004:137http://www.mandriva.com/security/advisories?name=MDKSA-2004:137MANDRAKE
FLSA-2006:152803http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00001.htmlFEDORA
RHSA-2004:610http://www.redhat.com/support/errata/RHSA-2004-610.htmlREDHAT
RHSA-2005:004http://www.redhat.com/support/errata/RHSA-2005-004.htmlREDHAT
11694http://www.securityfocus.com/bid/11694BIDPatch Vendor Advisory
USN-83-1http://www.ubuntu.com/usn/usn-83-1UBUNTU
USN-83-2http://www.ubuntu.com/usn/usn-83-2UBUNTU
http://www.x.org/pub/X11R6.8.1/patches/README.xorg-681-CAN-2004-0914.patchhttp://www.x.org/pub/X11R6.8.1/patches/README.xorg-681-CAN-2004-0914.patchCONFIRM
HPSBTU01228http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTU01228HP
libxpm-image-bo(18142)https://exchange.xforce.ibmcloud.com/vulnerabilities/18142XF
libxpm-improper-memory-access(18144)https://exchange.xforce.ibmcloud.com/vulnerabilities/18144XF
libxpm-command-execution(18145)https://exchange.xforce.ibmcloud.com/vulnerabilities/18145XF
libxpm-directory-traversal(18146)https://exchange.xforce.ibmcloud.com/vulnerabilities/18146XF
libxpm-dos(18147)https://exchange.xforce.ibmcloud.com/vulnerabilities/18147XF
oval:org.mitre.oval:def:9943https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9943OVAL