Rapid7 Vulnerability & Exploit Database

RHSA-2005:412: openmotif security update

Back to Search

RHSA-2005:412: openmotif security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
03/02/2005
Created
07/25/2018
Added
10/28/2005
Modified
07/12/2017

Description

Updated openmotif packages that fix a flaw in the Xpm image library are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team.

OpenMotif provides libraries which implement the Motif industry standard graphical user interface. An integer overflow flaw was found in libXpm, which is used to decode XPM (X PixMap) images. A vulnerable version of this library was found within OpenMotif. An attacker could create a carefully crafted XPM file which would cause an application to crash or potentially execute arbitrary code if opened by a victim. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0605 to this issue. Users of OpenMotif are advised to upgrade to these erratum packages, which contains a backported security patch to the embedded libXpm library.

Solution(s)

  • redhat-upgrade-openmotif
  • redhat-upgrade-openmotif-devel
  • redhat-upgrade-openmotif21

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;