Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://freedesktop.org/pipermail/xorg/2004-September/003172.html http://scary.beasts.org/security/CESA-2004-003.txt http://www.vuxml.org/freebsd/ef253f8b-0727-11d9-b45d-000c41e2cdad.html
Insight
The following packages are affected:
agenda-snow-libs
linux_base
open-motif-devel
mupad
zh-cle_base
libXpm
XFree86-libraries
xorg-libraries
lesstif
xpm
linux-openmotif
open-motif
CVE-2004-0687
Multiple stack-based buffer overflows in (1) xpmParseColors in parse.c, (2) ParseAndPutPixels in create.c, and (3) ParsePixels in parse.c for libXpm before 6.8.1 allow remote attackers to execute arbitrary code via a malformed XPM image file.
CVE-2004-0688
Multiple integer overflows in (1) the xpmParseColors function in parse.c, (2) XpmCreateImageFromXpmImage, (3) CreateXImage, (4) ParsePixels, and (5) ParseAndPutPixels for libXpm before 6.8.1 may allow remote attackers to execute arbitrary code via a malformed XPM image file.
Severity
Classification
-
CVE CVE-2004-0687, CVE-2004-0688 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities