Overview
- Description
- A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Weaknesses
- secalert@redhat.com
- CWE-426
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:x.org:libxpm:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D98D97AA-EDDE-48F7-B4DE-E51BFB5A72D3", "versionEndExcluding": "3.5.15" } ], "operator": "OR" } ] } ]