Page 31 of 254 results (0.007 seconds)

CVSS: 6.8EPSS: 0%CPEs: 8EXPL: 0

Multiple integer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XDGAQueryModes and (2) XDGASetMode functions. Múltiples desbordamientos de enteros en X.org libXxf86dga v1.1.3 y anteriores permiten que los servidores X provoquen una asignación de memoria insuficiente y un desbordamiento de búfer a través de vectores relacionados con las funciones (1) XDGAQueryModes y (2) XDGASetMode. • http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html http://www.debian.org/security/2013/dsa-2690 http://www.openwall.com/lists/oss-security/2013/05/23/3 http://www.ubuntu.com/usn/USN-1869-1 http://www.x.org/wiki/Development/Security/Advisory-2013-05-23 https://access.redhat.com/security/cve/CVE-2013-1991 https://bugzilla.redhat.com/show_bug.cgi?id=959072 • CWE-122: Heap-based Buffer Overflow CWE-189: Numeric Errors •

CVSS: 6.8EPSS: 0%CPEs: 5EXPL: 0

Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions. Múltiples desbordamientos de enteros en X.org libdmx v1.1.2 y anteriores permiten que los servidores X provoquen una asignación de memoria insuficiente y un desbordamiento de búfer a través de vectores relacionados con las funciones (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes y (3) DMXGetInputAttributes. • http://lists.fedoraproject.org/pipermail/package-announce/2013-May/107024.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00157.html http://www.debian.org/security/2013/dsa-2673 http://www.openwall.com/lists/oss-security/2013/05/23/3 http://www.ubuntu.com/usn/USN-1852-1 http://www.x.org/wiki/Development/Security/Advisory-2013-05-23 https://access.redhat.com/security/cve/CVE-2013-1992 https://bugzilla.redhat.com/show_bug.cgi?id=959074 • CWE-122: Heap-based Buffer Overflow CWE-189: Numeric Errors •

CVSS: 6.8EPSS: 0%CPEs: 6EXPL: 0

Multiple integer overflows in X.org libXv 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvQueryPortAttributes, (2) XvListImageFormats, and (3) XvCreateImage function. Múltiples desbordamientos de enteros en X.org libXv v1.0.7 y anteriores permiten a los servidores X provocar una asignación de memoria insuficiente y un desbordamiento de búfer a través de vectores relacionados con las funciones (1) XvQueryPortAttributes, (2) XvListImageFormats, y (3) XvCreateImage. • http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html http://www.debian.org/security/2013/dsa-2674 http://www.openwall.com/lists/oss-security/2013/05/23/3 http://www.ubuntu.com/usn/USN-1867-1 http://www.x.org/wiki/Development/Security/Advisory-2013-05-23 https://access.redhat.com/security/cve/CVE-2013-1989 https://bugzilla.redhat.com/show_bug.cgi?id=959068 • CWE-122: Heap-based Buffer Overflow CWE-189: Numeric Errors •

CVSS: 6.8EPSS: 1%CPEs: 12EXPL: 0

Buffer overflow in X.org libXv 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvQueryPortAttributes function. Un desbordamiento de búfer en libXv X.org v1.0.7 y anteriores permite causar una denegación de servicio a los servidores X (por caída de los mismos) y posiblemente ejecutar código de su elección a través de valores de longitud o de índice de la función XvQueryPortAttributes debidamente modificados. • http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html http://www.debian.org/security/2013/dsa-2674 http://www.openwall.com/lists/oss-security/2013/05/23/3 http://www.ubuntu.com/usn/USN-1867-1 http://www.x.org/wiki/Development/Security/Advisory-2013-05-23 https://access.redhat.com/security/cve/CVE-2013-2066 https://bugzilla.redhat.com/show_bug.cgi?id=960369 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 6.8EPSS: 0%CPEs: 6EXPL: 0

Multiple integer overflows in X.org libXvMC 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvMCListSurfaceTypes and (2) XvMCListSubpictureTypes functions. Múltiples desbordamientos de enteros en X.org libXvMC v1.0.7 y anteriores permiten a los servidores X provocar una asignación de memoria insuficiente y un desbordamiento de búfer a través de vectores relacionados con las funciones (1) XvMCListSurfaceTypes y (2) XvMCListSubpictureTypes. • http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html http://www.debian.org/security/2013/dsa-2675 http://www.openwall.com/lists/oss-security/2013/05/23/3 http://www.ubuntu.com/usn/USN-1868-1 http://www.x.org/wiki/Development/Security/Advisory-2013-05-23 https://access.redhat.com/security/cve/CVE-2013-1990 https://bugzilla.redhat.com/show_bug.cgi?id=959070 • CWE-122: Heap-based Buffer Overflow CWE-189: Numeric Errors •