{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2004-0687","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-08-08T00:24:27.112Z","dateReserved":"2004-07-13T00:00:00.000Z","datePublished":"2004-09-24T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2023-01-20T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Multiple stack-based buffer overflows in (1) xpmParseColors in parse.c, (2) ParseAndPutPixels in create.c, and (3) ParsePixels in parse.c for libXpm before 6.8.1 allow remote attackers to execute arbitrary code via a malformed XPM image file."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"name":"RHSA-2005:004","tags":["vendor-advisory"],"url":"http://www.redhat.com/support/errata/RHSA-2005-004.html"},{"name":"USN-27-1","tags":["vendor-advisory"],"url":"https://usn.ubuntu.com/27-1/"},{"name":"ADV-2006-1914","tags":["vdb-entry"],"url":"http://www.vupen.com/english/advisories/2006/1914"},{"name":"GLSA-200409-34","tags":["vendor-advisory"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200409-34.xml"},{"name":"VU#882750","tags":["third-party-advisory"],"url":"http://www.kb.cert.org/vuls/id/882750"},{"name":"TA05-136A","tags":["third-party-advisory"],"url":"http://www.us-cert.gov/cas/techalerts/TA05-136A.html"},{"name":"MDKSA-2004:098","tags":["vendor-advisory"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:098"},{"name":"HPSBUX02119","tags":["vendor-advisory"],"url":"http://www.securityfocus.com/archive/1/434715/100/0/threaded"},{"name":"RHSA-2004:537","tags":["vendor-advisory"],"url":"http://www.redhat.com/support/errata/RHSA-2004-537.html"},{"name":"20040915 CESA-2004-004: libXpm","tags":["mailing-list"],"url":"http://marc.info/?l=bugtraq&m=109530851323415&w=2"},{"name":"DSA-560","tags":["vendor-advisory"],"url":"http://www.debian.org/security/2004/dsa-560"},{"url":"http://scary.beasts.org/security/CESA-2004-003.txt"},{"name":"APPLE-SA-2005-05-03","tags":["vendor-advisory"],"url":"http://lists.apple.com/archives/security-announce/2005/May/msg00001.html"},{"name":"CLA-2005:924","tags":["vendor-advisory"],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000924"},{"name":"SUSE-SA:2004:034","tags":["vendor-advisory"],"url":"http://www.novell.com/linux/security/advisories/2004_34_xfree86_libs_xshared.html"},{"name":"11196","tags":["vdb-entry"],"url":"http://www.securityfocus.com/bid/11196"},{"name":"GLSA-200502-07","tags":["vendor-advisory"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200502-07.xml"},{"url":"http://ftp.x.org/pub/X11R6.8.0/patches/README.xorg-CAN-2004-0687-0688.patch"},{"name":"FLSA-2006:152803","tags":["vendor-advisory"],"url":"http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00001.html"},{"name":"20235","tags":["third-party-advisory"],"url":"http://secunia.com/advisories/20235"},{"name":"SSRT4848","tags":["vendor-advisory"],"url":"http://www.securityfocus.com/archive/1/434715/100/0/threaded"},{"name":"57653","tags":["vendor-advisory"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57653-1"},{"name":"oval:org.mitre.oval:def:9187","tags":["vdb-entry","signature"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9187"},{"name":"libxpm-multiple-stack-bo(17414)","tags":["vdb-entry"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17414"},{"url":"http://packetstormsecurity.com/files/170620/Solaris-10-dtprintinfo-libXm-libXpm-Security-Issues.html"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}],"datePublic":"2004-09-15T00:00:00.000Z"},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-08T00:24:27.112Z"},"title":"CVE Program Container","references":[{"name":"RHSA-2005:004","tags":["vendor-advisory","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2005-004.html"},{"name":"USN-27-1","tags":["vendor-advisory","x_transferred"],"url":"https://usn.ubuntu.com/27-1/"},{"name":"ADV-2006-1914","tags":["vdb-entry","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/1914"},{"name":"GLSA-200409-34","tags":["vendor-advisory","x_transferred"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200409-34.xml"},{"name":"VU#882750","tags":["third-party-advisory","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/882750"},{"name":"TA05-136A","tags":["third-party-advisory","x_transferred"],"url":"http://www.us-cert.gov/cas/techalerts/TA05-136A.html"},{"name":"MDKSA-2004:098","tags":["vendor-advisory","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:098"},{"name":"HPSBUX02119","tags":["vendor-advisory","x_transferred"],"url":"http://www.securityfocus.com/archive/1/434715/100/0/threaded"},{"name":"RHSA-2004:537","tags":["vendor-advisory","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2004-537.html"},{"name":"20040915 CESA-2004-004: libXpm","tags":["mailing-list","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=109530851323415&w=2"},{"name":"DSA-560","tags":["vendor-advisory","x_transferred"],"url":"http://www.debian.org/security/2004/dsa-560"},{"url":"http://scary.beasts.org/security/CESA-2004-003.txt","tags":["x_transferred"]},{"name":"APPLE-SA-2005-05-03","tags":["vendor-advisory","x_transferred"],"url":"http://lists.apple.com/archives/security-announce/2005/May/msg00001.html"},{"name":"CLA-2005:924","tags":["vendor-advisory","x_transferred"],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000924"},{"name":"SUSE-SA:2004:034","tags":["vendor-advisory","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2004_34_xfree86_libs_xshared.html"},{"name":"11196","tags":["vdb-entry","x_transferred"],"url":"http://www.securityfocus.com/bid/11196"},{"name":"GLSA-200502-07","tags":["vendor-advisory","x_transferred"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200502-07.xml"},{"url":"http://ftp.x.org/pub/X11R6.8.0/patches/README.xorg-CAN-2004-0687-0688.patch","tags":["x_transferred"]},{"name":"FLSA-2006:152803","tags":["vendor-advisory","x_transferred"],"url":"http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00001.html"},{"name":"20235","tags":["third-party-advisory","x_transferred"],"url":"http://secunia.com/advisories/20235"},{"name":"SSRT4848","tags":["vendor-advisory","x_transferred"],"url":"http://www.securityfocus.com/archive/1/434715/100/0/threaded"},{"name":"57653","tags":["vendor-advisory","x_transferred"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57653-1"},{"name":"oval:org.mitre.oval:def:9187","tags":["vdb-entry","signature","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9187"},{"name":"libxpm-multiple-stack-bo(17414)","tags":["vdb-entry","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17414"},{"url":"http://packetstormsecurity.com/files/170620/Solaris-10-dtprintinfo-libXm-libXpm-Security-Issues.html","tags":["x_transferred"]}]}]}}