Critical severity9.8NVD Advisory· Published Feb 1, 2017· Updated May 13, 2026
CVE-2016-10164
CVE-2016-10164
Description
Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which triggers a heap-based buffer overflow.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- www.openwall.com/lists/oss-security/2017/01/22/2nvdMailing ListPatchThird Party Advisory
- www.openwall.com/lists/oss-security/2017/01/25/7nvdMailing ListPatchThird Party Advisory
- cgit.freedesktop.org/xorg/lib/libXpm/commit/nvdIssue TrackingPatchThird Party Advisory
- lists.freedesktop.org/archives/xorg/2016-December/058537.htmlnvdIssue TrackingPatchThird Party Advisory
- www.securityfocus.com/bid/95785nvdThird Party AdvisoryVDB Entry
- www.debian.org/security/2017/dsa-3772nvd
- access.redhat.com/errata/RHSA-2017:1865nvd
- security.gentoo.org/glsa/201701-72nvd
News mentions
0No linked articles in our index yet.