X.Org Foundation SECURITY ADVISORY 2004-09-15 ============================================== Brookline MA, September 15, 2004 - X.Org has been made aware of a possible security vunerability in libXpm, the X Pixmap library which is shipped as part of the X Window System. The affected library is used in many popular application for image viewing and manipulation. Several stack overflows and integer overflows have been identified which may allow malicious XPM files to crash applications linking against libXpm. Furthermore the overflows may also be exploited to execute code under the account of the user running an allication linked against libXpm. The CVE numbers for these vulnerabilities are CAN-2004-0687 (integer overflows) and CAN-2004-0688 (stack overflows). Please check also: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 This advisory affects all known versions and releases of the X Window System shipping versions of libXpm, whether from X.Org or other vendors. Therefore users are strongly recommended to upgrade. A fix is available under: http://www.x.org/pub/X11R6.8.0/patches/xorg-CAN-2004-0687-0688.patch X.Org will provide a security update release for X11 R6.8.0 shortly. Vendors shipping releases of the X Window System have been informed and will provide updates for their software. The X.Org Foundation would like to thank Chris Evans for identifying the security exploits as well as Matthieu Herrb and Alan Coopersmith for providing a patch.