CVE-2016-10164

NameCVE-2016-10164
DescriptionMultiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which triggers a heap-based buffer overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-801-1, DSA-3772-1
NVD severityhigh (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxpm (PTS)wheezy1:3.5.10-1vulnerable
wheezy (security)1:3.5.10-1+deb7u1fixed
jessie (security), jessie1:3.5.12-0+deb8u1fixed
buster, sid, stretch1:3.5.12-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxpmsource(unstable)1:3.5.12-1high
libxpmsourcejessie1:3.5.12-0+deb8u1highDSA-3772-1
libxpmsourcewheezy1:3.5.10-1+deb7u1highDLA-801-1

Notes

Fixed by: https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185
http://www.openwall.com/lists/oss-security/2017/01/22/2

Search for package or bug name: Reporting problems