Your submission was sent successfully! Close

CVE-2016-10164

Published: 31 December 2016

Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which triggers a heap-based buffer overflow.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
libxpm
Launchpad, Ubuntu, Debian
Upstream
Released (1:3.5.12-1)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (1:3.5.11-1ubuntu0.16.04.1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1:3.5.10-1ubuntu0.1)
Patches:
Upstream: https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185