Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-43788

Опубликовано: 10 окт. 2023
Источник: debian
EPSS Низкий

Описание

A vulnerability was found in libXpm due to a boundary condition within the XpmCreateXpmImageFromBuffer() function. This flaw allows a local attacker to trigger an out-of-bounds read error and read the contents of memory on the system.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libxpmfixed1:3.5.17-1package

Примечания

  • https://www.openwall.com/lists/oss-security/2023/10/03/1

  • Fixed by: https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/2fa554b01ef6079a9b35df9332bdc4f139ed67e0

EPSS

Процентиль: 4%
0.00021
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 1 года назад

A vulnerability was found in libXpm due to a boundary condition within the XpmCreateXpmImageFromBuffer() function. This flaw allows a local attacker to trigger an out-of-bounds read error and read the contents of memory on the system.

CVSS3: 5.5
redhat
больше 1 года назад

A vulnerability was found in libXpm due to a boundary condition within the XpmCreateXpmImageFromBuffer() function. This flaw allows a local attacker to trigger an out-of-bounds read error and read the contents of memory on the system.

CVSS3: 5.5
nvd
больше 1 года назад

A vulnerability was found in libXpm due to a boundary condition within the XpmCreateXpmImageFromBuffer() function. This flaw allows a local attacker to trigger an out-of-bounds read error and read the contents of memory on the system.

CVSS3: 5.5
redos
больше 1 года назад

Уязвимости libXpm

CVSS3: 5.5
github
больше 1 года назад

A vulnerability was found in libXpm due to a boundary condition within the XpmCreateXpmImageFromBuffer() function. This flaw allows a local to trigger an out-of-bounds read error and read the contents of memory on the system.

EPSS

Процентиль: 4%
0.00021
Низкий