SB2013061501 - Buffer overflow in xorg.freedesktop xcmsdb
Published: June 15, 2013 Updated: July 28, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2013-2005)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
X.org libXt 1.1.3 and earlier does not check the return value of the XGetWindowProperty function, which allows X servers to trigger use of an uninitialized pointer and memory corruption via vectors related to the (1) ReqCleanup, (2) HandleSelectionEvents, (3) ReqTimedOut, (4) HandleNormal, and (5) HandleSelectionReplies functions.
Remediation
Install update from vendor's website.
References
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106785.html
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html
- http://www.debian.org/security/2013/dsa-2680
- http://www.openwall.com/lists/oss-security/2013/05/23/3
- http://www.securityfocus.com/bid/60133
- http://www.ubuntu.com/usn/USN-1865-1
- http://www.x.org/wiki/Development/Security/Advisory-2013-05-23