SB2013061504 - Buffer overflow in xorg.freedesktop libxi
Published: June 15, 2013 Updated: August 3, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2013-1998)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple buffer overflows in X.org libXi 1.7.1 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XGetDeviceButtonMapping, (2) XIPassiveGrabDevice, and (3) XQueryDeviceState functions.
Remediation
Install update from vendor's website.
References
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html
- http://www.debian.org/security/2013/dsa-2683
- http://www.openwall.com/lists/oss-security/2013/05/23/3
- http://www.securityfocus.com/bid/60127
- http://www.ubuntu.com/usn/USN-1859-1
- http://www.x.org/wiki/Development/Security/Advisory-2013-05-23