Description
Buffer overflow in compface 1.5.2 and earlier allows user-assisted attackers to cause a denial of service (crash) via a long declaration in a .xbm file. NOTE: this issue only affects compface on distributions that used a certain patch.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by His0k4 · pythonlocallinux
https://www.exploit-db.com/exploits/9302
exploitdb
WORKING POC
VERIFIED
by metalhoney · pythondoslinux
https://www.exploit-db.com/exploits/8982
References (5)
Core 5
Core References
Issue Tracking x_refsource_confirm
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534973
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2009/07/03/1
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2009/06/29/2
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2009/06/29/4
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/35863
Scores
EPSS
0.1209
EPSS Percentile
93.8%
Details
CWE
CWE-119
Status
published
Products (4)
james_ashton/compface
1.4
james_ashton/compface
1.5
james_ashton/compface
1.5.1
james_ashton/compface
< 1.5.2
Published
Jul 01, 2009
Tracked Since
Feb 18, 2026