8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
47.2%
A flaw was found in libXpm. When processing files with .Z or .gz
extensions, the library calls external programs to compress and uncompress
files, relying on the PATH environment variable to find these programs,
which could allow a malicious user to execute other programs by
manipulating the PATH environment variable.
Author | Note |
---|---|
alexmurray | motif contains a vendored copy of libxpm under lib/Xm/ with files prefixed by Xpm eg. the file src/parse.c in libxpm is lib/Xm/Xpmparse.c |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | libxpm | < 1:3.5.12-1ubuntu0.18.04.2 | UNKNOWN |
ubuntu | 20.04 | noarch | libxpm | < 1:3.5.12-1ubuntu0.20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | libxpm | < 1:3.5.12-1ubuntu0.22.04.1 | UNKNOWN |
ubuntu | 22.10 | noarch | libxpm | < 1:3.5.12-1ubuntu0.22.10.1 | UNKNOWN |
ubuntu | 23.04 | noarch | libxpm | < 1:3.5.12-1ubuntu1 | UNKNOWN |
ubuntu | 14.04 | noarch | libxpm | < any | UNKNOWN |
ubuntu | 16.04 | noarch | libxpm | < 1:3.5.11-1ubuntu0.16.04.1+esm1 | UNKNOWN |
ubuntu | 18.04 | noarch | motif | < any | UNKNOWN |
ubuntu | 20.04 | noarch | motif | < any | UNKNOWN |
ubuntu | 22.04 | noarch | motif | < any | UNKNOWN |