CVE-2013-2064

Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:secure_global_desktop:4.71:*:*:*:*:*:*:*
cpe:2.3:a:oracle:secure_global_desktop:5.2:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:x:libxcb:*:*:*:*:*:*:*:*
cpe:2.3:a:x:libxcb:1.1.90.1:*:*:*:*:*:*:*
cpe:2.3:a:x:libxcb:1.1.91:*:*:*:*:*:*:*
cpe:2.3:a:x:libxcb:1.1.92:*:*:*:*:*:*:*
cpe:2.3:a:x:libxcb:1.1.93:*:*:*:*:*:*:*
cpe:2.3:a:x:libxcb:1.2:*:*:*:*:*:*:*
cpe:2.3:a:x:libxcb:1.3:*:*:*:*:*:*:*
cpe:2.3:a:x:libxcb:1.4:*:*:*:*:*:*:*
cpe:2.3:a:x:libxcb:1.5:*:*:*:*:*:*:*
cpe:2.3:a:x:libxcb:1.6:*:*:*:*:*:*:*
cpe:2.3:a:x:libxcb:1.7:*:*:*:*:*:*:*
cpe:2.3:a:x:libxcb:1.8:*:*:*:*:*:*:*
cpe:2.3:a:x:libxcb:1.8.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:50

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106752.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106752.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-updates/2013-06/msg00137.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2013-06/msg00137.html - Third Party Advisory
References () http://www.debian.org/security/2013/dsa-2686 - Third Party Advisory () http://www.debian.org/security/2013/dsa-2686 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2013/05/23/3 - Third Party Advisory () http://www.openwall.com/lists/oss-security/2013/05/23/3 - Third Party Advisory
References () http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - Vendor Advisory () http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - Vendor Advisory
References () http://www.securityfocus.com/bid/60148 - () http://www.securityfocus.com/bid/60148 -
References () http://www.ubuntu.com/usn/USN-1855-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-1855-1 - Third Party Advisory
References () http://www.x.org/wiki/Development/Security/Advisory-2013-05-23 - Vendor Advisory () http://www.x.org/wiki/Development/Security/Advisory-2013-05-23 - Vendor Advisory

Information

Published : 2013-06-15 19:55

Updated : 2024-11-21 01:50


NVD link : CVE-2013-2064

Mitre link : CVE-2013-2064

CVE.ORG link : CVE-2013-2064


JSON object : View

Products Affected

opensuse

  • opensuse

x

  • libxcb

oracle

  • secure_global_desktop

canonical

  • ubuntu_linux

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-189

Numeric Errors