Vulnerability Details : CVE-2016-10164
Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which triggers a heap-based buffer overflow.
Vulnerability category: OverflowMemory CorruptionExecute codeDenial of service
Products affected by CVE-2016-10164
- cpe:2.3:a:x.org:libxpm:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-10164
1.43%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 79 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-10164
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2016-10164
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: nvd@nist.gov (Primary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-10164
-
https://access.redhat.com/errata/RHSA-2017:1865
-
https://lists.freedesktop.org/archives/xorg/2016-December/058537.html
[ANNOUNCE] libXpm 3.5.12Issue Tracking;Patch;Third Party Advisory
-
https://security.gentoo.org/glsa/201701-72
libXpm: Remote execution of arbitrary code (GLSA 201701-72) — Gentoo security
-
http://www.openwall.com/lists/oss-security/2017/01/22/2
oss-security - CVE Request: libXpm < 3.5.12 heap overflowMailing List;Patch;Third Party Advisory
-
http://www.securityfocus.com/bid/95785
libXpm CVE-2016-10164 Heap Based Buffer Overflow VulnerabilityThird Party Advisory;VDB Entry
-
https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185
xorg/lib/libXpm - XPM format pixmap library (mirrored from https://gitlab.freedesktop.org/xorg/lib/libxpm)Issue Tracking;Patch;Third Party Advisory
-
http://www.debian.org/security/2017/dsa-3772
Debian -- Security Information -- DSA-3772-1 libxpm
-
http://www.openwall.com/lists/oss-security/2017/01/25/7
oss-security - Re: CVE Request: libXpm < 3.5.12 heap overflowMailing List;Patch;Third Party Advisory
Jump to