{"id":"CVE-2016-10164","details":"Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which triggers a heap-based buffer overflow.","modified":"2026-03-20T11:04:43.892109Z","published":"2017-02-01T15:59:00.130Z","related":["MGASA-2017-0035","SUSE-SU-2017:0467-1","SUSE-SU-2017:0470-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1865"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-72"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3772"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95785"},{"type":"FIX","url":"https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185"},{"type":"FIX","url":"https://lists.freedesktop.org/archives/xorg/2016-December/058537.html"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2017/01/22/2"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2017/01/25/7"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/xorg/lib/libxpm","events":[{"introduced":"0"},{"last_affected":"3425cbb0e6086f74783eafbe23df1121b655e006"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.5.11"}]}}],"versions":["MODULAR_COPY","XACE-SELINUX-MERGE","XORG-6_7_99_1","XORG-6_7_99_2","XORG-6_7_99_901","XORG-6_7_99_902","XORG-6_7_99_903","XORG-6_7_99_904","XORG-6_8_0","XORG-6_8_99_1","XORG-6_8_99_10","XORG-6_8_99_11","XORG-6_8_99_12","XORG-6_8_99_13","XORG-6_8_99_14","XORG-6_8_99_15","XORG-6_8_99_16","XORG-6_8_99_2","XORG-6_8_99_3","XORG-6_8_99_4","XORG-6_8_99_5","XORG-6_8_99_6","XORG-6_8_99_7","XORG-6_8_99_8","XORG-6_8_99_9","XORG-6_8_99_900","XORG-6_8_99_901","XORG-6_8_99_902","XORG-6_8_99_903","XORG-6_99_99_900","XORG-6_99_99_901","XORG-6_99_99_902","XORG-6_99_99_903","XORG-6_99_99_904","XORG-7_0","XORG-7_0_99_901","XORG-7_1","lg3d-base","lg3d-rel-0-7-0","libXpm-3.5.10","libXpm-3.5.11","libXpm-3.5.6","libXpm-3.5.7","libXpm-3.5.8","libXpm-3.5.9","libXpm-3_5_5","rel-0-6-1","sco_port_update-base","xf86-012804-2330","xf86-4_3_0_1","xf86-4_3_99_16","xf86-4_3_99_901","xf86-4_3_99_902","xf86-4_3_99_903","xf86-4_3_99_903_special","xf86-4_4_0","xf86-4_4_99_1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-10164.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}