JFrog Security Research
< Back

XRAY-532775 - libX11 & libXpm Stack Exhaustion DoS

CVE-2023-43786 | CVSS 4.7

JFrog Severity:medium

Discovered ByYair Mizrahiof the JFrog Security Research Team

Published 4 Oct, 2023 | Last updated 4 Oct, 2023

A stack exhaustion caused by an infinite recursion in libX11 and libXpm may lead to denial of service when parsing malicious image files.

libx11 libxpm

(,1.8.7) (,3.5.17)

The PutSubImage() function in libX11 did not calculate properly the termination condition for recursion when creating a new image, resulting in an endless recursive process. As part of the bug report, a proof-of-concept demonstrating denial of service was included.

The PoC leveraged the bug in libXpm code during the parsing of Pixmap images to trigger the vulnerability in libX11. This vulnerability can be exploited through various means, including the sxpm command-line tool provided by libXpm for displaying Pixmap images on the screen, as well as any application that utilizes the vulnerable functions (for example, XpmReadFileToPixmap) within libXpm to parse Pixmap images.

An example for a vulnerable Xpm code snippet:

#include <stdio.h>

#include <X11/Xlib.h>
#include <X11/Xutil.h>

main()
{
    Display *display;
    Pixmap *pixmap, *shape;
    Window window, rootwindow;
    int width, height, screen;
    char* xpmfile = "file.xpm";

    display = XOpenDisplay (NULL);
    screen = DefaultScreen (display);
    width = DisplayWidth (display, screen);
    height = DisplayHeight (display, screen);
    rootwindow = RootWindow (display, screen);

    window = XCreateSimpleWindow (display, rootwindow, 0, 0, width, height, 0, 0, 0);
    XpmReadFileToPixmap (display, window, xpmfile, &pixmap, &shape, NULL);
}

No mitigations are supplied for this issue

Advisory

< Back