Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2005-0605
scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.032
EPSS Ranking
86.3%
CVSS Severity
CVSS v2 Score
7.5
References
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.5/SCOSA-2006.5.txt
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.57/SCOSA-2005.57.txt
ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U
http://bugs.gentoo.org/show_bug.cgi?id=83598
http://bugs.gentoo.org/show_bug.cgi?id=83655
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
http://secunia.com/advisories/14460
http://secunia.com/advisories/18049
http://secunia.com/advisories/18316
http://secunia.com/advisories/19624
http://security.gentoo.org/glsa/glsa-200503-08.xml
http://securitytracker.com/id?1013339
http://www.debian.org/security/2005/dsa-723
http://www.gentoo.org/security/en/glsa/glsa-200503-15.xml
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00001.html
http://www.redhat.com/support/errata/RHSA-2005-044.html
http://www.redhat.com/support/errata/RHSA-2005-198.html
http://www.redhat.com/support/errata/RHSA-2005-331.html
http://www.redhat.com/support/errata/RHSA-2005-412.html
http://www.redhat.com/support/errata/RHSA-2005-473.html
http://www.redhat.com/support/errata/RHSA-2008-0261.html
http://www.securityfocus.com/bid/12714
https://bugs.freedesktop.org/attachment.cgi?id=1909
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10411
https://usn.ubuntu.com/92-1/
https://usn.ubuntu.com/97-1/
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.5/SCOSA-2006.5.txt
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.57/SCOSA-2005.57.txt
ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U
http://bugs.gentoo.org/show_bug.cgi?id=83598
http://bugs.gentoo.org/show_bug.cgi?id=83655
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
http://secunia.com/advisories/14460
http://secunia.com/advisories/18049
http://secunia.com/advisories/18316
http://secunia.com/advisories/19624
http://security.gentoo.org/glsa/glsa-200503-08.xml
http://securitytracker.com/id?1013339
http://www.debian.org/security/2005/dsa-723
http://www.gentoo.org/security/en/glsa/glsa-200503-15.xml
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00001.html
http://www.redhat.com/support/errata/RHSA-2005-044.html
http://www.redhat.com/support/errata/RHSA-2005-198.html
http://www.redhat.com/support/errata/RHSA-2005-331.html
http://www.redhat.com/support/errata/RHSA-2005-412.html
http://www.redhat.com/support/errata/RHSA-2005-473.html
http://www.redhat.com/support/errata/RHSA-2008-0261.html
http://www.securityfocus.com/bid/12714
https://bugs.freedesktop.org/attachment.cgi?id=1909
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10411
https://usn.ubuntu.com/92-1/
https://usn.ubuntu.com/97-1/
Products affected by CVE-2005-0605
Lesstif
»
Lesstif
»
Version:
0.93.94
cpe:2.3:a:lesstif:lesstif:0.93.94
Sgi
»
Propack
»
Version:
3.0
cpe:2.3:a:sgi:propack:3.0
X.org
»
X11r6
»
Version:
6.7.0
cpe:2.3:a:x.org:x11r6:6.7.0
X.org
»
X11r6
»
Version:
6.8
cpe:2.3:a:x.org:x11r6:6.8
X.org
»
X11r6
»
Version:
6.8.1
cpe:2.3:a:x.org:x11r6:6.8.1
Xfree86 Project
»
X11r6
»
Version:
3.3
cpe:2.3:a:xfree86_project:x11r6:3.3
Xfree86 Project
»
X11r6
»
Version:
3.3.2
cpe:2.3:a:xfree86_project:x11r6:3.3.2
Xfree86 Project
»
X11r6
»
Version:
3.3.3
cpe:2.3:a:xfree86_project:x11r6:3.3.3
Xfree86 Project
»
X11r6
»
Version:
3.3.4
cpe:2.3:a:xfree86_project:x11r6:3.3.4
Xfree86 Project
»
X11r6
»
Version:
3.3.5
cpe:2.3:a:xfree86_project:x11r6:3.3.5
Xfree86 Project
»
X11r6
»
Version:
3.3.6
cpe:2.3:a:xfree86_project:x11r6:3.3.6
Xfree86 Project
»
X11r6
»
Version:
4.0
cpe:2.3:a:xfree86_project:x11r6:4.0
Xfree86 Project
»
X11r6
»
Version:
4.0.1
cpe:2.3:a:xfree86_project:x11r6:4.0.1
Xfree86 Project
»
X11r6
»
Version:
4.0.2.11
cpe:2.3:a:xfree86_project:x11r6:4.0.2.11
Xfree86 Project
»
X11r6
»
Version:
4.0.3
cpe:2.3:a:xfree86_project:x11r6:4.0.3
Xfree86 Project
»
X11r6
»
Version:
4.1.0
cpe:2.3:a:xfree86_project:x11r6:4.1.0
Xfree86 Project
»
X11r6
»
Version:
4.1.11
cpe:2.3:a:xfree86_project:x11r6:4.1.11
Xfree86 Project
»
X11r6
»
Version:
4.1.12
cpe:2.3:a:xfree86_project:x11r6:4.1.12
Xfree86 Project
»
X11r6
»
Version:
4.2.0
cpe:2.3:a:xfree86_project:x11r6:4.2.0
Xfree86 Project
»
X11r6
»
Version:
4.2.1
cpe:2.3:a:xfree86_project:x11r6:4.2.1
Xfree86 Project
»
X11r6
»
Version:
4.3.0
cpe:2.3:a:xfree86_project:x11r6:4.3.0
Xfree86 Project
»
X11r6
»
Version:
4.3.0.1
cpe:2.3:a:xfree86_project:x11r6:4.3.0.1
Xfree86 Project
»
X11r6
»
Version:
4.3.0.2
cpe:2.3:a:xfree86_project:x11r6:4.3.0.2
Altlinux
»
Alt Linux
»
Version:
2.3
cpe:2.3:o:altlinux:alt_linux:2.3
Mandrakesoft
»
Mandrake Linux
»
Version:
10.0
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0
Mandrakesoft
»
Mandrake Linux
»
Version:
10.1
cpe:2.3:o:mandrakesoft:mandrake_linux:10.1
Mandrakesoft
»
Mandrake Linux
»
Version:
10.2
cpe:2.3:o:mandrakesoft:mandrake_linux:10.2
Mandrakesoft
»
Mandrake Linux Corporate Server
»
Version:
2.1
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1
Mandrakesoft
»
Mandrake Linux Corporate Server
»
Version:
3.0
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0
Redhat
»
Enterprise Linux
»
Version:
3.0
cpe:2.3:o:redhat:enterprise_linux:3.0
Redhat
»
Enterprise Linux
»
Version:
4.0
cpe:2.3:o:redhat:enterprise_linux:4.0
Redhat
»
Enterprise Linux Desktop
»
Version:
3.0
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0
Redhat
»
Enterprise Linux Desktop
»
Version:
4.0
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0
Redhat
»
Fedora Core
»
Version:
core_2.0
cpe:2.3:o:redhat:fedora_core:core_2.0
Redhat
»
Fedora Core
»
Version:
core_3.0
cpe:2.3:o:redhat:fedora_core:core_3.0
Suse
»
Suse Linux
»
Version:
6.1
cpe:2.3:o:suse:suse_linux:6.1
Suse
»
Suse Linux
»
Version:
6.2
cpe:2.3:o:suse:suse_linux:6.2
Suse
»
Suse Linux
»
Version:
6.3
cpe:2.3:o:suse:suse_linux:6.3
Suse
»
Suse Linux
»
Version:
6.4
cpe:2.3:o:suse:suse_linux:6.4
Suse
»
Suse Linux
»
Version:
7.0
cpe:2.3:o:suse:suse_linux:7.0
Suse
»
Suse Linux
»
Version:
7.1
cpe:2.3:o:suse:suse_linux:7.1
Suse
»
Suse Linux
»
Version:
7.2
cpe:2.3:o:suse:suse_linux:7.2
Suse
»
Suse Linux
»
Version:
7.3
cpe:2.3:o:suse:suse_linux:7.3
Suse
»
Suse Linux
»
Version:
8.0
cpe:2.3:o:suse:suse_linux:8.0
Suse
»
Suse Linux
»
Version:
8.1
cpe:2.3:o:suse:suse_linux:8.1
Suse
»
Suse Linux
»
Version:
8.2
cpe:2.3:o:suse:suse_linux:8.2
Suse
»
Suse Linux
»
Version:
9.0
cpe:2.3:o:suse:suse_linux:9.0
Suse
»
Suse Linux
»
Version:
9.1
cpe:2.3:o:suse:suse_linux:9.1
Suse
»
Suse Linux
»
Version:
9.2
cpe:2.3:o:suse:suse_linux:9.2
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved