Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-6408-1

Ubuntu Security Notice 6408-1 - Yair Mizrahi discovered that libXpm incorrectly handled certain malformed XPM image files. If a user were tricked into opening a specially crafted XPM image file, a remote attacker could possibly use this issue to consume memory, leading to a denial of service. Yair Mizrahi discovered that libXpm incorrectly handled certain malformed XPM image files. If a user were tricked into opening a specially crafted XPM image file, a remote attacker could use this issue to cause libXpm to crash, leading to a denial of service, or possibly execute arbitrary code.

Packet Storm
#vulnerability#ubuntu#dos
==========================================================================Ubuntu Security Notice USN-6408-1October 03, 2023libxpm vulnerabilities==========================================================================A security issue affects these releases of Ubuntu and its derivatives:- Ubuntu 23.04- Ubuntu 22.04 LTS- Ubuntu 20.04 LTSSummary:Several security issues were fixed in libXpm.Software Description:- libxpm: X11 pixmap libraryDetails:Yair Mizrahi discovered that libXpm incorrectly handled certain malformedXPM image files. If a user were tricked into opening a specially craftedXPM image file, a remote attacker could possibly use this issue to consumememory, leading to a denial of service. (CVE-2023-43786)Yair Mizrahi discovered that libXpm incorrectly handled certain malformedXPM image files. If a user were tricked into opening a specially craftedXPM image file, a remote attacker could use this issue to cause libXpm tocrash, leading to a denial of service, or possibly execute arbitrary code.(CVE-2023-43787)Alan Coopersmith discovered that libXpm incorrectly handled certainmalformed XPM image files. If a user were tricked into opening a speciallycrafted XPM image file, a remote attacker could possibly use this issue tocause libXpm to crash, leading to a denial of service. (CVE-2023-43788,CVE-2023-43789)Update instructions:The problem can be corrected by updating your system to the followingpackage versions:Ubuntu 23.04:   libxpm4                         1:3.5.12-1.1ubuntu0.1Ubuntu 22.04 LTS:   libxpm4                         1:3.5.12-1ubuntu0.22.04.2Ubuntu 20.04 LTS:   libxpm4                         1:3.5.12-1ubuntu0.20.04.2After a standard system update you need to reboot your computer to make allthe necessary changes.References:   https://ubuntu.com/security/notices/USN-6408-1   CVE-2023-43786, CVE-2023-43787, CVE-2023-43788, CVE-2023-43789Package Information:   https://launchpad.net/ubuntu/+source/libxpm/1:3.5.12-1.1ubuntu0.1   https://launchpad.net/ubuntu/+source/libxpm/1:3.5.12-1ubuntu0.22.04.2   https://launchpad.net/ubuntu/+source/libxpm/1:3.5.12-1ubuntu0.20.04.2

Related news

Gentoo Linux Security Advisory 202407-21

Gentoo Linux Security Advisory 202407-21 - Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service. Versions greater than or equal to 1.8.7 are affected.

CVE-2023-48660: DSA-2023-443: Dell PowerMaxOS 5978, Dell Unisphere 360, Dell Unisphere for PowerMax, Dell Unisphere for PowerMax Virtual Appliance, Dell Solutions Enabler Virtual Appliance, and Dell PowerMax EEM Secu

Dell vApp Manger, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote attacker could potentially exploit this vulnerability to read arbitrary files from the target system.

Ubuntu Security Notice USN-6408-2

Ubuntu Security Notice 6408-2 - USN-6408-1 fixed several vulnerabilities in libXpm. This update provides the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Yair Mizrahi discovered that libXpm incorrectly handled certain malformed XPM image files. If a user were tricked into opening a specially crafted XPM image file, a remote attacker could possibly use this issue to consume memory, leading to a denial of service.

CVE-2023-43789: cve-details

A vulnerability was found in libXpm where a vulnerability exists due to a boundary condition, a local user can trigger an out-of-bounds read error and read contents of memory on the system.

CVE-2023-43786: cve-details

A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function. This flaw allows a local user to consume all available system resources and cause a denial of service condition.

CVE-2023-43787: cve-details

A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function. This flaw allows a local user to trigger an integer overflow and execute arbitrary code with elevated privileges.

CVE-2023-43788: Invalid Bug ID

A vulnerability was found in libXpm due to a boundary condition within the XpmCreateXpmImageFromBuffer() function. This flaw allows a local to trigger an out-of-bounds read error and read the contents of memory on the system.

Debian Security Advisory 5517-1

Debian Linux Security Advisory 5517-1 - Multiple security vulnerabilities were discovered in libx11, the X11 client-side library, which may result in denial of service or the execution of arbitrary code.

Debian Security Advisory 5516-1

Debian Linux Security Advisory 5516-1 - Multiple security vulnerabilities were discovered in libxpm, the X11 pixmap library, which may result in denial of service or the execution of arbitrary code.

Ubuntu Security Notice USN-6407-1

Ubuntu Security Notice 6407-1 - Gregory James Duck discovered that libx11 incorrectly handled certain keyboard symbols. If a user were tricked into connecting to a malicious X server, a remote attacker could use this issue to cause libx11 to crash, resulting in a denial of service, or possibly execute arbitrary code. Yair Mizrahi discovered that libx11 incorrectly handled certain malformed XPM image files. If a user were tricked into opening a specially crafted XPM image file, a remote attacker could possibly use this issue to consume memory, leading to a denial of service.

Ubuntu Security Notice USN-6407-1

Ubuntu Security Notice 6407-1 - Gregory James Duck discovered that libx11 incorrectly handled certain keyboard symbols. If a user were tricked into connecting to a malicious X server, a remote attacker could use this issue to cause libx11 to crash, resulting in a denial of service, or possibly execute arbitrary code. Yair Mizrahi discovered that libx11 incorrectly handled certain malformed XPM image files. If a user were tricked into opening a specially crafted XPM image file, a remote attacker could possibly use this issue to consume memory, leading to a denial of service.

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution